2024-05-26 14:27:05 +02:00
### [CVE-2018-6789](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6789)



### Description
An issue was discovered in the base64d function in the SMTP listener in Exim before 4.90.1. By sending a handcrafted message, a buffer overflow may happen. This can be used to execute code remotely.
### POC
#### Reference
- http://packetstormsecurity.com/files/162959/Exim-base64d-Buffer-Overflow.html
2024-06-09 00:33:16 +00:00
- http://packetstormsecurity.com/files/162959/Exim-base64d-Buffer-Overflow.html
2024-05-26 14:27:05 +02:00
- https://www.exploit-db.com/exploits/44571/
2024-06-09 00:33:16 +00:00
- https://www.exploit-db.com/exploits/44571/
2024-05-26 14:27:05 +02:00
- https://www.exploit-db.com/exploits/45671/
2024-06-09 00:33:16 +00:00
- https://www.exploit-db.com/exploits/45671/
2024-05-26 14:27:05 +02:00
#### Github
- https://github.com/0xT11/CVE-POC
- https://github.com/ARPSyndicate/cvemon
- https://github.com/Ostorlab/KEV
- https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors
- https://github.com/Stab1el/BAGUA
- https://github.com/beraphin/CVE-2018-6789
- https://github.com/c0llision/exim-vuln-poc
- https://github.com/ethan42/time-machine
- https://github.com/hectorgie/PoC-in-GitHub
- https://github.com/lnick2023/nicenice
- https://github.com/martinclauss/exim-rce-cve-2018-6789
- https://github.com/qazbnm456/awesome-cve-poc
- https://github.com/sereok3/buffer-overflow-writeups
- https://github.com/synacktiv/Exim-CVE-2018-6789
- https://github.com/thistehneisen/CVE-2018-6789-Python3
- https://github.com/windware1203/InfoSec_study
- https://github.com/xbl3/awesome-cve-poc_qazbnm456