ID CVE-2010-4344
Summary Heap-based buffer overflow in the string_vformat function in string.c in Exim before 4.70 allows remote attackers to execute arbitrary code via an SMTP session that includes two MAIL commands in conjunction with a large message containing crafted headers, leading to improper rejection logging.
References
Vulnerable Configurations
  • cpe:2.3:a:exim:exim:-:*:*:*:*:*:*:*
    cpe:2.3:a:exim:exim:-:*:*:*:*:*:*:*
  • cpe:2.3:a:exim:exim:2.10:*:*:*:*:*:*:*
    cpe:2.3:a:exim:exim:2.10:*:*:*:*:*:*:*
  • cpe:2.3:a:exim:exim:2.11:*:*:*:*:*:*:*
    cpe:2.3:a:exim:exim:2.11:*:*:*:*:*:*:*
  • cpe:2.3:a:exim:exim:2.12:*:*:*:*:*:*:*
    cpe:2.3:a:exim:exim:2.12:*:*:*:*:*:*:*
  • cpe:2.3:a:exim:exim:3.00:*:*:*:*:*:*:*
    cpe:2.3:a:exim:exim:3.00:*:*:*:*:*:*:*
  • cpe:2.3:a:exim:exim:3.01:*:*:*:*:*:*:*
    cpe:2.3:a:exim:exim:3.01:*:*:*:*:*:*:*
  • cpe:2.3:a:exim:exim:3.02:*:*:*:*:*:*:*
    cpe:2.3:a:exim:exim:3.02:*:*:*:*:*:*:*
  • cpe:2.3:a:exim:exim:3.03:*:*:*:*:*:*:*
    cpe:2.3:a:exim:exim:3.03:*:*:*:*:*:*:*
  • cpe:2.3:a:exim:exim:3.10:*:*:*:*:*:*:*
    cpe:2.3:a:exim:exim:3.10:*:*:*:*:*:*:*
  • cpe:2.3:a:exim:exim:3.11:*:*:*:*:*:*:*
    cpe:2.3:a:exim:exim:3.11:*:*:*:*:*:*:*
  • cpe:2.3:a:exim:exim:3.12:*:*:*:*:*:*:*
    cpe:2.3:a:exim:exim:3.12:*:*:*:*:*:*:*
  • cpe:2.3:a:exim:exim:3.13:*:*:*:*:*:*:*
    cpe:2.3:a:exim:exim:3.13:*:*:*:*:*:*:*
  • cpe:2.3:a:exim:exim:3.14:*:*:*:*:*:*:*
    cpe:2.3:a:exim:exim:3.14:*:*:*:*:*:*:*
  • cpe:2.3:a:exim:exim:3.15:*:*:*:*:*:*:*
    cpe:2.3:a:exim:exim:3.15:*:*:*:*:*:*:*
  • cpe:2.3:a:exim:exim:3.16:*:*:*:*:*:*:*
    cpe:2.3:a:exim:exim:3.16:*:*:*:*:*:*:*
  • cpe:2.3:a:exim:exim:3.20:*:*:*:*:*:*:*
    cpe:2.3:a:exim:exim:3.20:*:*:*:*:*:*:*
  • cpe:2.3:a:exim:exim:3.21:*:*:*:*:*:*:*
    cpe:2.3:a:exim:exim:3.21:*:*:*:*:*:*:*
  • cpe:2.3:a:exim:exim:3.22:*:*:*:*:*:*:*
    cpe:2.3:a:exim:exim:3.22:*:*:*:*:*:*:*
  • cpe:2.3:a:exim:exim:3.30:*:*:*:*:*:*:*
    cpe:2.3:a:exim:exim:3.30:*:*:*:*:*:*:*
  • cpe:2.3:a:exim:exim:3.31:*:*:*:*:*:*:*
    cpe:2.3:a:exim:exim:3.31:*:*:*:*:*:*:*
  • cpe:2.3:a:exim:exim:3.32:*:*:*:*:*:*:*
    cpe:2.3:a:exim:exim:3.32:*:*:*:*:*:*:*
  • cpe:2.3:a:exim:exim:3.33:*:*:*:*:*:*:*
    cpe:2.3:a:exim:exim:3.33:*:*:*:*:*:*:*
  • cpe:2.3:a:exim:exim:3.34:*:*:*:*:*:*:*
    cpe:2.3:a:exim:exim:3.34:*:*:*:*:*:*:*
  • cpe:2.3:a:exim:exim:3.35:*:*:*:*:*:*:*
    cpe:2.3:a:exim:exim:3.35:*:*:*:*:*:*:*
  • cpe:2.3:a:exim:exim:3.36:*:*:*:*:*:*:*
    cpe:2.3:a:exim:exim:3.36:*:*:*:*:*:*:*
  • cpe:2.3:a:exim:exim:4.00:*:*:*:*:*:*:*
    cpe:2.3:a:exim:exim:4.00:*:*:*:*:*:*:*
  • cpe:2.3:a:exim:exim:4.01:*:*:*:*:*:*:*
    cpe:2.3:a:exim:exim:4.01:*:*:*:*:*:*:*
  • cpe:2.3:a:exim:exim:4.02:*:*:*:*:*:*:*
    cpe:2.3:a:exim:exim:4.02:*:*:*:*:*:*:*
  • cpe:2.3:a:exim:exim:4.03:*:*:*:*:*:*:*
    cpe:2.3:a:exim:exim:4.03:*:*:*:*:*:*:*
  • cpe:2.3:a:exim:exim:4.04:*:*:*:*:*:*:*
    cpe:2.3:a:exim:exim:4.04:*:*:*:*:*:*:*
  • cpe:2.3:a:exim:exim:4.05:*:*:*:*:*:*:*
    cpe:2.3:a:exim:exim:4.05:*:*:*:*:*:*:*
  • cpe:2.3:a:exim:exim:4.10:*:*:*:*:*:*:*
    cpe:2.3:a:exim:exim:4.10:*:*:*:*:*:*:*
  • cpe:2.3:a:exim:exim:4.11:*:*:*:*:*:*:*
    cpe:2.3:a:exim:exim:4.11:*:*:*:*:*:*:*
  • cpe:2.3:a:exim:exim:4.12:*:*:*:*:*:*:*
    cpe:2.3:a:exim:exim:4.12:*:*:*:*:*:*:*
  • cpe:2.3:a:exim:exim:4.14:*:*:*:*:*:*:*
    cpe:2.3:a:exim:exim:4.14:*:*:*:*:*:*:*
  • cpe:2.3:a:exim:exim:4.20:*:*:*:*:*:*:*
    cpe:2.3:a:exim:exim:4.20:*:*:*:*:*:*:*
  • cpe:2.3:a:exim:exim:4.21:*:*:*:*:*:*:*
    cpe:2.3:a:exim:exim:4.21:*:*:*:*:*:*:*
  • cpe:2.3:a:exim:exim:4.22:*:*:*:*:*:*:*
    cpe:2.3:a:exim:exim:4.22:*:*:*:*:*:*:*
  • cpe:2.3:a:exim:exim:4.23:*:*:*:*:*:*:*
    cpe:2.3:a:exim:exim:4.23:*:*:*:*:*:*:*
  • cpe:2.3:a:exim:exim:4.24:*:*:*:*:*:*:*
    cpe:2.3:a:exim:exim:4.24:*:*:*:*:*:*:*
  • cpe:2.3:a:exim:exim:4.30:*:*:*:*:*:*:*
    cpe:2.3:a:exim:exim:4.30:*:*:*:*:*:*:*
  • cpe:2.3:a:exim:exim:4.31:*:*:*:*:*:*:*
    cpe:2.3:a:exim:exim:4.31:*:*:*:*:*:*:*
  • cpe:2.3:a:exim:exim:4.32:*:*:*:*:*:*:*
    cpe:2.3:a:exim:exim:4.32:*:*:*:*:*:*:*
  • cpe:2.3:a:exim:exim:4.33:*:*:*:*:*:*:*
    cpe:2.3:a:exim:exim:4.33:*:*:*:*:*:*:*
  • cpe:2.3:a:exim:exim:4.34:*:*:*:*:*:*:*
    cpe:2.3:a:exim:exim:4.34:*:*:*:*:*:*:*
  • cpe:2.3:a:exim:exim:4.40:*:*:*:*:*:*:*
    cpe:2.3:a:exim:exim:4.40:*:*:*:*:*:*:*
  • cpe:2.3:a:exim:exim:4.41:*:*:*:*:*:*:*
    cpe:2.3:a:exim:exim:4.41:*:*:*:*:*:*:*
  • cpe:2.3:a:exim:exim:4.42:*:*:*:*:*:*:*
    cpe:2.3:a:exim:exim:4.42:*:*:*:*:*:*:*
  • cpe:2.3:a:exim:exim:4.43:*:*:*:*:*:*:*
    cpe:2.3:a:exim:exim:4.43:*:*:*:*:*:*:*
  • cpe:2.3:a:exim:exim:4.44:*:*:*:*:*:*:*
    cpe:2.3:a:exim:exim:4.44:*:*:*:*:*:*:*
  • cpe:2.3:a:exim:exim:4.50:*:*:*:*:*:*:*
    cpe:2.3:a:exim:exim:4.50:*:*:*:*:*:*:*
  • cpe:2.3:a:exim:exim:4.51:*:*:*:*:*:*:*
    cpe:2.3:a:exim:exim:4.51:*:*:*:*:*:*:*
  • cpe:2.3:a:exim:exim:4.52:*:*:*:*:*:*:*
    cpe:2.3:a:exim:exim:4.52:*:*:*:*:*:*:*
  • cpe:2.3:a:exim:exim:4.53:*:*:*:*:*:*:*
    cpe:2.3:a:exim:exim:4.53:*:*:*:*:*:*:*
  • cpe:2.3:a:exim:exim:4.54:*:*:*:*:*:*:*
    cpe:2.3:a:exim:exim:4.54:*:*:*:*:*:*:*
  • cpe:2.3:a:exim:exim:4.60:*:*:*:*:*:*:*
    cpe:2.3:a:exim:exim:4.60:*:*:*:*:*:*:*
  • cpe:2.3:a:exim:exim:4.61:*:*:*:*:*:*:*
    cpe:2.3:a:exim:exim:4.61:*:*:*:*:*:*:*
  • cpe:2.3:a:exim:exim:4.62:*:*:*:*:*:*:*
    cpe:2.3:a:exim:exim:4.62:*:*:*:*:*:*:*
  • cpe:2.3:a:exim:exim:4.63:*:*:*:*:*:*:*
    cpe:2.3:a:exim:exim:4.63:*:*:*:*:*:*:*
  • cpe:2.3:a:exim:exim:4.64:*:*:*:*:*:*:*
    cpe:2.3:a:exim:exim:4.64:*:*:*:*:*:*:*
  • cpe:2.3:a:exim:exim:4.65:*:*:*:*:*:*:*
    cpe:2.3:a:exim:exim:4.65:*:*:*:*:*:*:*
  • cpe:2.3:a:exim:exim:4.66:*:*:*:*:*:*:*
    cpe:2.3:a:exim:exim:4.66:*:*:*:*:*:*:*
  • cpe:2.3:a:exim:exim:4.67:*:*:*:*:*:*:*
    cpe:2.3:a:exim:exim:4.67:*:*:*:*:*:*:*
  • cpe:2.3:a:exim:exim:4.68:*:*:*:*:*:*:*
    cpe:2.3:a:exim:exim:4.68:*:*:*:*:*:*:*
  • cpe:2.3:a:exim:exim:4.69:*:*:*:*:*:*:*
    cpe:2.3:a:exim:exim:4.69:*:*:*:*:*:*:*
  • cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*
    cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*
  • cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*
    cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*
  • cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
    cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
  • cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
    cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
  • cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
    cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
  • cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
    cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
  • cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
    cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
CVSS
Base: 9.3 (as of 16-07-2024 - 17:57)
Impact:
Exploitability:
CWE CWE-787
CAPEC
Access
VectorComplexityAuthentication
NETWORK MEDIUM NONE
Impact
ConfidentialityIntegrityAvailability
COMPLETE COMPLETE COMPLETE
cvss-vector via4 AV:N/AC:M/Au:N/C:C/I:C/A:C
redhat via4
advisories
bugzilla
id 661756
title CVE-2010-4344 exim: remote code execution flaw
oval
OR
  • comment Red Hat Enterprise Linux must be installed
    oval oval:com.redhat.rhba:tst:20070304026
  • AND
    • comment Red Hat Enterprise Linux 4 is installed
      oval oval:com.redhat.rhba:tst:20070304025
    • OR
      • AND
        • comment exim is earlier than 0:4.43-1.RHEL4.5.el4_8.1
          oval oval:com.redhat.rhsa:tst:20100970001
        • comment exim is signed with Red Hat master key
          oval oval:com.redhat.rhsa:tst:20100970002
      • AND
        • comment exim-doc is earlier than 0:4.43-1.RHEL4.5.el4_8.1
          oval oval:com.redhat.rhsa:tst:20100970003
        • comment exim-doc is signed with Red Hat master key
          oval oval:com.redhat.rhsa:tst:20100970004
      • AND
        • comment exim-mon is earlier than 0:4.43-1.RHEL4.5.el4_8.1
          oval oval:com.redhat.rhsa:tst:20100970005
        • comment exim-mon is signed with Red Hat master key
          oval oval:com.redhat.rhsa:tst:20100970006
      • AND
        • comment exim-sa is earlier than 0:4.43-1.RHEL4.5.el4_8.1
          oval oval:com.redhat.rhsa:tst:20100970007
        • comment exim-sa is signed with Red Hat master key
          oval oval:com.redhat.rhsa:tst:20100970008
  • AND
    • comment Red Hat Enterprise Linux 5 is installed
      oval oval:com.redhat.rhba:tst:20070331005
    • OR
      • AND
        • comment exim is earlier than 0:4.63-5.el5_5.2
          oval oval:com.redhat.rhsa:tst:20100970010
        • comment exim is signed with Red Hat redhatrelease key
          oval oval:com.redhat.rhsa:tst:20100970011
      • AND
        • comment exim-mon is earlier than 0:4.63-5.el5_5.2
          oval oval:com.redhat.rhsa:tst:20100970012
        • comment exim-mon is signed with Red Hat redhatrelease key
          oval oval:com.redhat.rhsa:tst:20100970013
      • AND
        • comment exim-sa is earlier than 0:4.63-5.el5_5.2
          oval oval:com.redhat.rhsa:tst:20100970014
        • comment exim-sa is signed with Red Hat redhatrelease key
          oval oval:com.redhat.rhsa:tst:20100970015
rhsa
id RHSA-2010:0970
released 2010-12-10
severity Critical
title RHSA-2010:0970: exim security update (Critical)
rpms
  • exim-0:4.43-1.RHEL4.5.el4_7.1
  • exim-0:4.43-1.RHEL4.5.el4_8.1
  • exim-0:4.63-3.el5_3.1
  • exim-0:4.63-3.el5_4.1
  • exim-0:4.63-5.el5_5.2
  • exim-debuginfo-0:4.43-1.RHEL4.5.el4_7.1
  • exim-debuginfo-0:4.43-1.RHEL4.5.el4_8.1
  • exim-debuginfo-0:4.63-3.el5_3.1
  • exim-debuginfo-0:4.63-3.el5_4.1
  • exim-debuginfo-0:4.63-5.el5_5.2
  • exim-doc-0:4.43-1.RHEL4.5.el4_7.1
  • exim-doc-0:4.43-1.RHEL4.5.el4_8.1
  • exim-mon-0:4.43-1.RHEL4.5.el4_7.1
  • exim-mon-0:4.43-1.RHEL4.5.el4_8.1
  • exim-mon-0:4.63-3.el5_3.1
  • exim-mon-0:4.63-3.el5_4.1
  • exim-mon-0:4.63-5.el5_5.2
  • exim-sa-0:4.43-1.RHEL4.5.el4_7.1
  • exim-sa-0:4.43-1.RHEL4.5.el4_8.1
  • exim-sa-0:4.63-3.el5_3.1
  • exim-sa-0:4.63-3.el5_4.1
  • exim-sa-0:4.63-5.el5_5.2
refmap via4
bid 45308
bugtraq 20101213 Exim security issue in historical release
cert-vn VU#682457
confirm
debian DSA-2131
misc
mlist
  • [exim-dev] 20101207 Remote root vulnerability in Exim
  • [exim-dev] 20101210 Re: Remote root vulnerability in Exim
  • [oss-security] 20101210 Exim remote root
osvdb 69685
sectrack 1024858
secunia
  • 40019
  • 42576
  • 42586
  • 42587
  • 42589
suse SUSE-SA:2010:059
ubuntu USN-1032-1
vupen
  • ADV-2010-3171
  • ADV-2010-3172
  • ADV-2010-3181
  • ADV-2010-3186
  • ADV-2010-3204
  • ADV-2010-3246
  • ADV-2010-3317
Last major update 16-07-2024 - 17:57
Published 14-12-2010 - 16:00
Last modified 16-07-2024 - 17:57
Back to Top