CVE-2018-6789
Exim Buffer Overflow Vulnerability
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
10Exploited in Wild
YesDecision
Descriptions
An issue was discovered in the base64d function in the SMTP listener in Exim before 4.90.1. By sending a handcrafted message, a buffer overflow may happen. This can be used to execute code remotely.
Se ha descubierto un problema en la función base64d en el escuchador SMTP en Exim, en versiones anteriores a la 4.90.1. Al enviar un mensaje manipulado, podría ocurrir un desbordamiento de búfer. Esto puede emplearse para ejecutar código de forma remota.
Meh Chang discovered a buffer overflow flaw in a utility function used in the SMTP listener of Exim, a mail transport agent. A remote attacker can take advantage of this flaw to cause a denial of service, or potentially the execution of arbitrary code via a specially crafted message.
Exim contains a buffer overflow vulnerability in the base64d function part of the SMTP listener that may allow for remote code execution.
CVSS Scores
SSVC
- Decision:Act
Timeline
- 2018-02-06 CVE Reserved
- 2018-02-08 CVE Published
- 2018-05-03 First Exploit
- 2021-11-03 Exploited in Wild
- 2022-05-03 KEV Due Date
- 2025-02-07 CVE Updated
- 2025-04-01 EPSS Updated
CWE
- CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
- CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CAPEC
References (21)
URL | Tag | Source |
---|---|---|
http://openwall.com/lists/oss-security/2018/02/10/2 | Mailing List | |
http://packetstormsecurity.com/files/162959/Exim-base64d-Buffer-Overflow.html | X_refsource_misc |
|
http://www.openwall.com/lists/oss-security/2018/02/07/2 | Mailing List |
|
http://www.securityfocus.com/bid/103049 | Third Party Advisory | |
http://www.securitytracker.com/id/1040461 | Third Party Advisory | |
https://devco.re/blog/2018/03/06/exim-off-by-one-RCE-exploiting-CVE-2018-6789-en | Technical Description | |
https://lists.debian.org/debian-lts-announce/2018/02/msg00009.html | Mailing List |
|
URL | Date | SRC |
---|---|---|
https://packetstorm.news/files/id/162959 | 2021-06-03 | |
https://packetstorm.news/files/id/149926 | 2018-10-24 | |
https://packetstorm.news/files/id/147456 | 2018-05-03 | |
https://www.exploit-db.com/exploits/45671 | 2025-02-07 | |
https://www.exploit-db.com/exploits/44571 | 2025-02-07 | |
https://github.com/synacktiv/Exim-CVE-2018-6789 | 2019-10-10 | |
https://github.com/beraphin/CVE-2018-6789 | 2020-03-06 | |
https://github.com/c0llision/exim-vuln-poc | 2018-05-03 | |
https://github.com/martinclauss/exim-rce-cve-2018-6789 | 2024-11-21 | |
https://github.com/thistehneisen/CVE-2018-6789-Python3 | 2023-08-05 |
URL | Date | SRC |
---|---|---|
https://git.exim.org/exim.git/commit/cf3cd306062a08969c41a1cdd32c6855f1abecf1 | 2021-06-03 |
URL | Date | SRC |
---|---|---|
https://exim.org/static/doc/security/CVE-2018-6789.txt | 2021-06-03 | |
https://usn.ubuntu.com/3565-1 | 2021-06-03 | |
https://www.debian.org/security/2018/dsa-4110 | 2021-06-03 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Exim Search vendor "Exim" | Exim Search vendor "Exim" for product "Exim" | < 4.90.1 Search vendor "Exim" for product "Exim" and version " < 4.90.1" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 7.0 Search vendor "Debian" for product "Debian Linux" and version "7.0" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 8.0 Search vendor "Debian" for product "Debian Linux" and version "8.0" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 9.0 Search vendor "Debian" for product "Debian Linux" and version "9.0" | - |
Affected
| ||||||
Canonical Search vendor "Canonical" | Ubuntu Linux Search vendor "Canonical" for product "Ubuntu Linux" | 14.04 Search vendor "Canonical" for product "Ubuntu Linux" and version "14.04" | lts |
Affected
| ||||||
Canonical Search vendor "Canonical" | Ubuntu Linux Search vendor "Canonical" for product "Ubuntu Linux" | 16.04 Search vendor "Canonical" for product "Ubuntu Linux" and version "16.04" | lts |
Affected
| ||||||
Canonical Search vendor "Canonical" | Ubuntu Linux Search vendor "Canonical" for product "Ubuntu Linux" | 17.10 Search vendor "Canonical" for product "Ubuntu Linux" and version "17.10" | - |
Affected
|