### [CVE-2018-6789](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6789) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description An issue was discovered in the base64d function in the SMTP listener in Exim before 4.90.1. By sending a handcrafted message, a buffer overflow may happen. This can be used to execute code remotely. ### POC #### Reference - http://packetstormsecurity.com/files/162959/Exim-base64d-Buffer-Overflow.html - https://www.exploit-db.com/exploits/44571/ - https://www.exploit-db.com/exploits/45671/ #### Github - https://github.com/0xT11/CVE-POC - https://github.com/ARPSyndicate/cvemon - https://github.com/Ostorlab/KEV - https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors - https://github.com/Stab1el/BAGUA - https://github.com/beraphin/CVE-2018-6789 - https://github.com/c0llision/exim-vuln-poc - https://github.com/ethan42/time-machine - https://github.com/hectorgie/PoC-in-GitHub - https://github.com/lnick2023/nicenice - https://github.com/martinclauss/exim-rce-cve-2018-6789 - https://github.com/qazbnm456/awesome-cve-poc - https://github.com/sereok3/buffer-overflow-writeups - https://github.com/synacktiv/Exim-CVE-2018-6789 - https://github.com/thistehneisen/CVE-2018-6789-Python3 - https://github.com/windware1203/InfoSec_study - https://github.com/xbl3/awesome-cve-poc_qazbnm456