{ "id": "CVE-2010-4344", "sourceIdentifier": "secalert@redhat.com", "published": "2010-12-14T16:00:04.163", "lastModified": "2023-02-13T04:28:35.607", "vulnStatus": "Modified", "cisaExploitAdd": "2022-03-25", "cisaActionDue": "2022-04-15", "cisaRequiredAction": "Apply updates per vendor instructions.", "cisaVulnerabilityName": "Exim Heap-Based Buffer Overflow Vulnerability", "descriptions": [ { "lang": "en", "value": "Heap-based buffer overflow in the string_vformat function in string.c in Exim before 4.70 allows remote attackers to execute arbitrary code via an SMTP session that includes two MAIL commands in conjunction with a large message containing crafted headers, leading to improper rejection logging." }, { "lang": "es", "value": "Desbordamiento de b\u00fafer basado en mont\u00edculo en la funci\u00f3n string_vformat en string.c en Exim antes de v4.70 permite a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s de una sesi\u00f3n de SMTP que incluye dos comandos MAIL junto con un mensaje de gran tama\u00f1o que contiene cabeceras modificadas, lo que lleva a un registro impropio del rechazo." } ], "metrics": { "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "baseScore": 9.3 }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, "impactScore": 10.0, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "CWE-119" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:exim:exim:*:*:*:*:*:*:*:*", "versionEndIncluding": "4.69", "matchCriteriaId": "F16DB595-F624-4EC4-89B9-F066075CCC0C" }, { "vulnerable": true, "criteria": "cpe:2.3:a:exim:exim:2.10:*:*:*:*:*:*:*", "matchCriteriaId": "DCB4B1A4-A631-4D25-B7F1-C180098E86AD" }, { "vulnerable": true, "criteria": "cpe:2.3:a:exim:exim:2.11:*:*:*:*:*:*:*", "matchCriteriaId": "AE701510-2879-4C78-8C1D-151D5C527B4B" }, { "vulnerable": true, "criteria": "cpe:2.3:a:exim:exim:2.12:*:*:*:*:*:*:*", "matchCriteriaId": "00FEC5EC-EE91-4702-BD9D-4023243AA7C9" }, { "vulnerable": true, "criteria": "cpe:2.3:a:exim:exim:3.00:*:*:*:*:*:*:*", "matchCriteriaId": "CB2BAB64-3A0B-4B8D-8C9A-726435218123" }, { "vulnerable": true, "criteria": "cpe:2.3:a:exim:exim:3.01:*:*:*:*:*:*:*", "matchCriteriaId": "7BAF74CC-9C39-4FB6-94B5-26865A8BBA5F" }, { "vulnerable": true, "criteria": "cpe:2.3:a:exim:exim:3.02:*:*:*:*:*:*:*", "matchCriteriaId": "5F3BC841-2C51-4CBD-B666-FCB531F43AC4" }, { "vulnerable": true, "criteria": "cpe:2.3:a:exim:exim:3.03:*:*:*:*:*:*:*", "matchCriteriaId": "69C84D14-E466-4FD3-B79C-D227AD178E4C" }, { "vulnerable": true, "criteria": "cpe:2.3:a:exim:exim:3.10:*:*:*:*:*:*:*", "matchCriteriaId": "3B5B15C1-3D3E-4875-AD4A-69798309DB3F" }, { "vulnerable": true, "criteria": "cpe:2.3:a:exim:exim:3.11:*:*:*:*:*:*:*", "matchCriteriaId": "64368CD7-9F8C-4D33-98B5-2F429A1F77DF" }, { "vulnerable": true, "criteria": "cpe:2.3:a:exim:exim:3.12:*:*:*:*:*:*:*", "matchCriteriaId": "40751F4F-46A3-4047-8532-CBEF2328D99C" }, { "vulnerable": true, "criteria": "cpe:2.3:a:exim:exim:3.13:*:*:*:*:*:*:*", "matchCriteriaId": "C38566A6-B0A0-4228-A038-04817FFD543F" }, { "vulnerable": true, "criteria": "cpe:2.3:a:exim:exim:3.14:*:*:*:*:*:*:*", "matchCriteriaId": "D1432D82-EA09-4C8B-A82D-BA41E14D3FE9" }, { "vulnerable": true, "criteria": "cpe:2.3:a:exim:exim:3.15:*:*:*:*:*:*:*", "matchCriteriaId": "0E5C3CA8-00BF-4A35-AA5B-45D21CC2F965" }, { "vulnerable": true, "criteria": "cpe:2.3:a:exim:exim:3.16:*:*:*:*:*:*:*", "matchCriteriaId": "90E35B41-4048-43AD-8DF0-7B4088869A88" }, { "vulnerable": true, "criteria": "cpe:2.3:a:exim:exim:3.20:*:*:*:*:*:*:*", "matchCriteriaId": "3114B51A-E651-4095-B817-0978673FDE6F" }, { "vulnerable": true, "criteria": "cpe:2.3:a:exim:exim:3.21:*:*:*:*:*:*:*", "matchCriteriaId": "D6A6FC30-6AF0-4382-95B0-1672929F8150" }, { "vulnerable": true, "criteria": "cpe:2.3:a:exim:exim:3.22:*:*:*:*:*:*:*", "matchCriteriaId": "97A2321F-017F-4D7F-A27A-22725912ABA3" }, { "vulnerable": true, "criteria": "cpe:2.3:a:exim:exim:3.30:*:*:*:*:*:*:*", "matchCriteriaId": "A2187D70-7ADA-401E-B03E-E1A92D9CDD59" }, { "vulnerable": true, "criteria": "cpe:2.3:a:exim:exim:3.31:*:*:*:*:*:*:*", "matchCriteriaId": "C8639E64-721A-4155-B775-CD3F775356F1" }, { "vulnerable": true, "criteria": "cpe:2.3:a:exim:exim:3.32:*:*:*:*:*:*:*", "matchCriteriaId": "DA92BC83-33D0-4387-8C93-F2F0754E227A" }, { "vulnerable": true, "criteria": "cpe:2.3:a:exim:exim:3.33:*:*:*:*:*:*:*", "matchCriteriaId": "F7E7B583-CB1D-43FE-A05C-4B31F64FD6A6" }, { "vulnerable": true, "criteria": "cpe:2.3:a:exim:exim:3.34:*:*:*:*:*:*:*", "matchCriteriaId": "A35D9EF0-0267-4092-BC67-4C4B842B8ABF" }, { "vulnerable": true, "criteria": "cpe:2.3:a:exim:exim:3.35:*:*:*:*:*:*:*", "matchCriteriaId": "5FE35F22-5B61-45A4-B8A2-67B8E792D58C" }, { "vulnerable": true, "criteria": "cpe:2.3:a:exim:exim:3.36:*:*:*:*:*:*:*", "matchCriteriaId": "BC707056-63FC-4E61-A9A3-F89FE0E490E8" }, { "vulnerable": true, "criteria": "cpe:2.3:a:exim:exim:4.00:*:*:*:*:*:*:*", "matchCriteriaId": "92A7C49F-8826-47A5-BA9E-28472DFC5EFB" }, { "vulnerable": true, "criteria": "cpe:2.3:a:exim:exim:4.01:*:*:*:*:*:*:*", "matchCriteriaId": "52B3A794-43C7-4071-8E5A-EA209903165F" }, { "vulnerable": true, "criteria": "cpe:2.3:a:exim:exim:4.02:*:*:*:*:*:*:*", "matchCriteriaId": "84DBC4E0-608F-40AA-AE30-D40D72F9BED4" }, { "vulnerable": true, "criteria": "cpe:2.3:a:exim:exim:4.03:*:*:*:*:*:*:*", "matchCriteriaId": "71998344-4AC0-473F-980C-D8D0077E19A3" }, { "vulnerable": true, "criteria": "cpe:2.3:a:exim:exim:4.04:*:*:*:*:*:*:*", "matchCriteriaId": "42DA6BCE-7F17-4426-B514-3D50C764F4C0" }, { "vulnerable": true, "criteria": "cpe:2.3:a:exim:exim:4.05:*:*:*:*:*:*:*", "matchCriteriaId": "032862E6-F4CB-4E0E-93CA-0663E8536A1E" }, { "vulnerable": true, "criteria": "cpe:2.3:a:exim:exim:4.10:*:*:*:*:*:*:*", "matchCriteriaId": "0EC43E6B-2DA9-496E-BAD2-04FF4C3A53FA" }, { "vulnerable": true, "criteria": "cpe:2.3:a:exim:exim:4.11:*:*:*:*:*:*:*", "matchCriteriaId": "9FF31403-56FE-48D4-A93C-91B4DC89489B" }, { "vulnerable": true, "criteria": "cpe:2.3:a:exim:exim:4.12:*:*:*:*:*:*:*", "matchCriteriaId": "CB5A240D-CA4D-4929-BA60-DBE621A4E6F9" }, { "vulnerable": true, "criteria": "cpe:2.3:a:exim:exim:4.14:*:*:*:*:*:*:*", "matchCriteriaId": "6BE1A094-2760-49CA-84A8-84B19BE2BE59" }, { "vulnerable": true, "criteria": "cpe:2.3:a:exim:exim:4.20:*:*:*:*:*:*:*", "matchCriteriaId": "04C4B45D-A0AC-42B3-99D7-91F7B8D15B69" }, { "vulnerable": true, "criteria": "cpe:2.3:a:exim:exim:4.21:*:*:*:*:*:*:*", "matchCriteriaId": "ED822CDF-C94B-4A16-BEEB-FECE51CBB744" }, { "vulnerable": true, "criteria": "cpe:2.3:a:exim:exim:4.22:*:*:*:*:*:*:*", "matchCriteriaId": "B52A1ECA-44CC-4DDE-B1AD-25AE27605317" }, { "vulnerable": true, "criteria": "cpe:2.3:a:exim:exim:4.23:*:*:*:*:*:*:*", "matchCriteriaId": "3E7D5D6F-8FDB-4AC2-A4D9-16E632AC8EAC" }, { "vulnerable": true, "criteria": "cpe:2.3:a:exim:exim:4.24:*:*:*:*:*:*:*", "matchCriteriaId": "A4FEC2B4-BD68-428E-91BC-BC85F72E3BE8" }, { "vulnerable": true, "criteria": "cpe:2.3:a:exim:exim:4.30:*:*:*:*:*:*:*", "matchCriteriaId": "23EEBB47-2495-4FDB-9A55-415DA69392E8" }, { "vulnerable": true, "criteria": "cpe:2.3:a:exim:exim:4.31:*:*:*:*:*:*:*", "matchCriteriaId": "D4A8E154-32CC-4665-82A0-1DE7A51B2435" }, { "vulnerable": true, "criteria": "cpe:2.3:a:exim:exim:4.32:*:*:*:*:*:*:*", "matchCriteriaId": "4B594190-DF8F-45AE-8579-BD7B4568606F" }, { "vulnerable": true, "criteria": "cpe:2.3:a:exim:exim:4.33:*:*:*:*:*:*:*", "matchCriteriaId": "BD2D8712-4DF9-4A73-93A7-7719C3502E18" }, { "vulnerable": true, "criteria": "cpe:2.3:a:exim:exim:4.34:*:*:*:*:*:*:*", "matchCriteriaId": "2D9DF054-4CBF-4BA7-9A42-5627DC4B6A68" }, { "vulnerable": true, "criteria": "cpe:2.3:a:exim:exim:4.40:*:*:*:*:*:*:*", "matchCriteriaId": "B13E6533-BEB9-4082-9063-7E3CCBF4C36C" }, { "vulnerable": true, "criteria": "cpe:2.3:a:exim:exim:4.41:*:*:*:*:*:*:*", "matchCriteriaId": "879B9641-3245-4CF7-912A-FD21372F46F4" }, { "vulnerable": true, "criteria": "cpe:2.3:a:exim:exim:4.42:*:*:*:*:*:*:*", "matchCriteriaId": "A91CA841-BBCA-4EF9-BC00-478A18797941" }, { "vulnerable": true, "criteria": "cpe:2.3:a:exim:exim:4.43:*:*:*:*:*:*:*", "matchCriteriaId": "EEA3F58C-3EF2-48B9-9171-7EFE72B1A3DD" }, { "vulnerable": true, "criteria": "cpe:2.3:a:exim:exim:4.44:*:*:*:*:*:*:*", "matchCriteriaId": "AFB37C45-54E7-4E91-8E6D-0A3E764E1702" }, { "vulnerable": true, "criteria": "cpe:2.3:a:exim:exim:4.50:*:*:*:*:*:*:*", "matchCriteriaId": "31CBE3C0-4918-4FA6-B1E7-6336913EF8D6" }, { "vulnerable": true, "criteria": "cpe:2.3:a:exim:exim:4.51:*:*:*:*:*:*:*", "matchCriteriaId": "FC45BCE0-F190-4050-8B3B-869D0C1033AE" }, { "vulnerable": true, "criteria": "cpe:2.3:a:exim:exim:4.52:*:*:*:*:*:*:*", "matchCriteriaId": "6FD0E5A4-3FCB-46C1-A709-CA15D96FA9B0" }, { "vulnerable": true, "criteria": "cpe:2.3:a:exim:exim:4.53:*:*:*:*:*:*:*", "matchCriteriaId": "D3335C80-97AE-42DB-B125-0D3FA57D8317" }, { "vulnerable": true, "criteria": "cpe:2.3:a:exim:exim:4.54:*:*:*:*:*:*:*", "matchCriteriaId": "0F83560A-BDD7-456D-846C-D1DAF5C9DA64" }, { "vulnerable": true, "criteria": "cpe:2.3:a:exim:exim:4.60:*:*:*:*:*:*:*", "matchCriteriaId": "22B9FD06-13E3-47CA-AB67-691DC3A9C330" }, { "vulnerable": true, "criteria": "cpe:2.3:a:exim:exim:4.61:*:*:*:*:*:*:*", "matchCriteriaId": "EE2A81F2-3E53-4A31-BCC6-BDC0E1B62CC8" }, { "vulnerable": true, "criteria": "cpe:2.3:a:exim:exim:4.62:*:*:*:*:*:*:*", "matchCriteriaId": "2A03C071-87BF-4D5E-ABED-472ABAEFAC71" }, { "vulnerable": true, "criteria": "cpe:2.3:a:exim:exim:4.63:*:*:*:*:*:*:*", "matchCriteriaId": "D1D96C53-989C-42C8-9E71-A206B78ED55A" }, { "vulnerable": true, "criteria": "cpe:2.3:a:exim:exim:4.64:*:*:*:*:*:*:*", "matchCriteriaId": "30190EAB-7140-4E0A-B7A5-8FA8BD0749C9" }, { "vulnerable": true, "criteria": "cpe:2.3:a:exim:exim:4.65:*:*:*:*:*:*:*", "matchCriteriaId": "E0BD63C5-C916-4D7D-AE81-7B9676FC0951" }, { "vulnerable": true, "criteria": "cpe:2.3:a:exim:exim:4.66:*:*:*:*:*:*:*", "matchCriteriaId": "CCD8FE2F-8D53-407A-BB83-EB7725456D71" }, { "vulnerable": true, "criteria": "cpe:2.3:a:exim:exim:4.67:*:*:*:*:*:*:*", "matchCriteriaId": "162F5CB4-1931-4236-8519-DD63A98BCEE0" }, { "vulnerable": true, "criteria": "cpe:2.3:a:exim:exim:4.68:*:*:*:*:*:*:*", "matchCriteriaId": "9EF06704-E078-42FA-89DA-7BCA169D0E5B" } ] } ] } ], "references": [ { "url": "ftp://ftp.exim.org/pub/exim/ChangeLogs/ChangeLog-4.70", "source": "secalert@redhat.com" }, { "url": "http://atmail.com/blog/2010/atmail-6204-now-available/", "source": "secalert@redhat.com" }, { "url": "http://bugs.exim.org/show_bug.cgi?id=787", "source": "secalert@redhat.com", "tags": [ "Patch" ] }, { "url": "http://git.exim.org/exim.git/commit/24c929a27415c7cfc7126c47e4cad39acf3efa6b", "source": "secalert@redhat.com", "tags": [ "Patch" ] }, { "url": "http://lists.exim.org/lurker/message/20101210.164935.385e04d0.en.html", "source": "secalert@redhat.com", "tags": [ "Patch" ] }, { "url": "http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00003.html", "source": "secalert@redhat.com" }, { "url": "http://openwall.com/lists/oss-security/2010/12/10/1", "source": "secalert@redhat.com" }, { "url": "http://secunia.com/advisories/40019", "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ] }, { "url": "http://secunia.com/advisories/42576", "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ] }, { "url": "http://secunia.com/advisories/42586", "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ] }, { "url": "http://secunia.com/advisories/42587", "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ] }, { "url": "http://secunia.com/advisories/42589", "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ] }, { "url": "http://www.cpanel.net/2010/12/exim-remote-memory-corruption-vulnerability-notification-cve-2010-4344.html", "source": "secalert@redhat.com" }, { "url": "http://www.debian.org/security/2010/dsa-2131", "source": "secalert@redhat.com" }, { "url": "http://www.exim.org/lurker/message/20101207.215955.bb32d4f2.en.html", "source": "secalert@redhat.com" }, { "url": "http://www.kb.cert.org/vuls/id/682457", "source": "secalert@redhat.com", "tags": [ "US Government Resource" ] }, { "url": "http://www.metasploit.com/modules/exploit/unix/smtp/exim4_string_format", "source": "secalert@redhat.com" }, { "url": "http://www.openwall.com/lists/oss-security/2021/05/04/7", "source": "secalert@redhat.com" }, { "url": "http://www.osvdb.org/69685", "source": "secalert@redhat.com", "tags": [ "Exploit", "Patch" ] }, { "url": "http://www.redhat.com/support/errata/RHSA-2010-0970.html", "source": "secalert@redhat.com" }, { "url": "http://www.securityfocus.com/archive/1/515172/100/0/threaded", "source": "secalert@redhat.com" }, { "url": "http://www.securityfocus.com/bid/45308", "source": "secalert@redhat.com" }, { "url": "http://www.securitytracker.com/id?1024858", "source": "secalert@redhat.com" }, { "url": "http://www.theregister.co.uk/2010/12/11/exim_code_execution_peril/", "source": "secalert@redhat.com" }, { "url": "http://www.ubuntu.com/usn/USN-1032-1", "source": "secalert@redhat.com" }, { "url": "http://www.vupen.com/english/advisories/2010/3171", "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ] }, { "url": "http://www.vupen.com/english/advisories/2010/3172", "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ] }, { "url": "http://www.vupen.com/english/advisories/2010/3181", "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ] }, { "url": "http://www.vupen.com/english/advisories/2010/3186", "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ] }, { "url": "http://www.vupen.com/english/advisories/2010/3204", "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ] }, { "url": "http://www.vupen.com/english/advisories/2010/3246", "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ] }, { "url": "http://www.vupen.com/english/advisories/2010/3317", "source": "secalert@redhat.com" }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=661756", "source": "secalert@redhat.com", "tags": [ "Exploit" ] } ] }