fkie_cve-2014-2957
Vulnerability from fkie_nvd
Published
2014-09-04 17:55
Modified
2025-04-12 10:46
Severity ?
Summary
The dmarc_process function in dmarc.c in Exim before 4.82.1, when EXPERIMENTAL_DMARC is enabled, allows remote attackers to execute arbitrary code via the From header in an email, which is passed to the expand_string function.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| exim | exim | * | |
| exim | exim | 4.00 | |
| exim | exim | 4.01 | |
| exim | exim | 4.02 | |
| exim | exim | 4.03 | |
| exim | exim | 4.04 | |
| exim | exim | 4.05 | |
| exim | exim | 4.10 | |
| exim | exim | 4.11 | |
| exim | exim | 4.12 | |
| exim | exim | 4.14 | |
| exim | exim | 4.20 | |
| exim | exim | 4.21 | |
| exim | exim | 4.22 | |
| exim | exim | 4.23 | |
| exim | exim | 4.24 | |
| exim | exim | 4.30 | |
| exim | exim | 4.31 | |
| exim | exim | 4.32 | |
| exim | exim | 4.33 | |
| exim | exim | 4.34 | |
| exim | exim | 4.40 | |
| exim | exim | 4.41 | |
| exim | exim | 4.42 | |
| exim | exim | 4.43 | |
| exim | exim | 4.44 | |
| exim | exim | 4.50 | |
| exim | exim | 4.51 | |
| exim | exim | 4.52 | |
| exim | exim | 4.53 | |
| exim | exim | 4.54 | |
| exim | exim | 4.60 | |
| exim | exim | 4.61 | |
| exim | exim | 4.62 | |
| exim | exim | 4.63 | |
| exim | exim | 4.64 | |
| exim | exim | 4.65 | |
| exim | exim | 4.66 | |
| exim | exim | 4.67 | |
| exim | exim | 4.68 | |
| exim | exim | 4.69 | |
| exim | exim | 4.70 | |
| exim | exim | 4.71 | |
| exim | exim | 4.72 | |
| exim | exim | 4.73 | |
| exim | exim | 4.74 | |
| exim | exim | 4.75 | |
| exim | exim | 4.76 | |
| exim | exim | 4.77 | |
| exim | exim | 4.80 | |
| exim | exim | 4.80.1 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:exim:exim:*:*:*:*:*:*:*:*",
"matchCriteriaId": "32852B31-CB6C-40D7-AD55-E76D38E1F192",
"versionEndIncluding": "4.82",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:exim:exim:4.00:*:*:*:*:*:*:*",
"matchCriteriaId": "92A7C49F-8826-47A5-BA9E-28472DFC5EFB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:exim:exim:4.01:*:*:*:*:*:*:*",
"matchCriteriaId": "52B3A794-43C7-4071-8E5A-EA209903165F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:exim:exim:4.02:*:*:*:*:*:*:*",
"matchCriteriaId": "84DBC4E0-608F-40AA-AE30-D40D72F9BED4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:exim:exim:4.03:*:*:*:*:*:*:*",
"matchCriteriaId": "71998344-4AC0-473F-980C-D8D0077E19A3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:exim:exim:4.04:*:*:*:*:*:*:*",
"matchCriteriaId": "42DA6BCE-7F17-4426-B514-3D50C764F4C0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:exim:exim:4.05:*:*:*:*:*:*:*",
"matchCriteriaId": "032862E6-F4CB-4E0E-93CA-0663E8536A1E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:exim:exim:4.10:*:*:*:*:*:*:*",
"matchCriteriaId": "0EC43E6B-2DA9-496E-BAD2-04FF4C3A53FA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:exim:exim:4.11:*:*:*:*:*:*:*",
"matchCriteriaId": "9FF31403-56FE-48D4-A93C-91B4DC89489B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:exim:exim:4.12:*:*:*:*:*:*:*",
"matchCriteriaId": "CB5A240D-CA4D-4929-BA60-DBE621A4E6F9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:exim:exim:4.14:*:*:*:*:*:*:*",
"matchCriteriaId": "6BE1A094-2760-49CA-84A8-84B19BE2BE59",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:exim:exim:4.20:*:*:*:*:*:*:*",
"matchCriteriaId": "04C4B45D-A0AC-42B3-99D7-91F7B8D15B69",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:exim:exim:4.21:*:*:*:*:*:*:*",
"matchCriteriaId": "ED822CDF-C94B-4A16-BEEB-FECE51CBB744",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:exim:exim:4.22:*:*:*:*:*:*:*",
"matchCriteriaId": "B52A1ECA-44CC-4DDE-B1AD-25AE27605317",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:exim:exim:4.23:*:*:*:*:*:*:*",
"matchCriteriaId": "3E7D5D6F-8FDB-4AC2-A4D9-16E632AC8EAC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:exim:exim:4.24:*:*:*:*:*:*:*",
"matchCriteriaId": "A4FEC2B4-BD68-428E-91BC-BC85F72E3BE8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:exim:exim:4.30:*:*:*:*:*:*:*",
"matchCriteriaId": "23EEBB47-2495-4FDB-9A55-415DA69392E8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:exim:exim:4.31:*:*:*:*:*:*:*",
"matchCriteriaId": "D4A8E154-32CC-4665-82A0-1DE7A51B2435",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:exim:exim:4.32:*:*:*:*:*:*:*",
"matchCriteriaId": "4B594190-DF8F-45AE-8579-BD7B4568606F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:exim:exim:4.33:*:*:*:*:*:*:*",
"matchCriteriaId": "BD2D8712-4DF9-4A73-93A7-7719C3502E18",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:exim:exim:4.34:*:*:*:*:*:*:*",
"matchCriteriaId": "2D9DF054-4CBF-4BA7-9A42-5627DC4B6A68",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:exim:exim:4.40:*:*:*:*:*:*:*",
"matchCriteriaId": "B13E6533-BEB9-4082-9063-7E3CCBF4C36C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:exim:exim:4.41:*:*:*:*:*:*:*",
"matchCriteriaId": "879B9641-3245-4CF7-912A-FD21372F46F4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:exim:exim:4.42:*:*:*:*:*:*:*",
"matchCriteriaId": "A91CA841-BBCA-4EF9-BC00-478A18797941",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:exim:exim:4.43:*:*:*:*:*:*:*",
"matchCriteriaId": "EEA3F58C-3EF2-48B9-9171-7EFE72B1A3DD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:exim:exim:4.44:*:*:*:*:*:*:*",
"matchCriteriaId": "AFB37C45-54E7-4E91-8E6D-0A3E764E1702",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:exim:exim:4.50:*:*:*:*:*:*:*",
"matchCriteriaId": "31CBE3C0-4918-4FA6-B1E7-6336913EF8D6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:exim:exim:4.51:*:*:*:*:*:*:*",
"matchCriteriaId": "FC45BCE0-F190-4050-8B3B-869D0C1033AE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:exim:exim:4.52:*:*:*:*:*:*:*",
"matchCriteriaId": "6FD0E5A4-3FCB-46C1-A709-CA15D96FA9B0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:exim:exim:4.53:*:*:*:*:*:*:*",
"matchCriteriaId": "D3335C80-97AE-42DB-B125-0D3FA57D8317",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:exim:exim:4.54:*:*:*:*:*:*:*",
"matchCriteriaId": "0F83560A-BDD7-456D-846C-D1DAF5C9DA64",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:exim:exim:4.60:*:*:*:*:*:*:*",
"matchCriteriaId": "22B9FD06-13E3-47CA-AB67-691DC3A9C330",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:exim:exim:4.61:*:*:*:*:*:*:*",
"matchCriteriaId": "EE2A81F2-3E53-4A31-BCC6-BDC0E1B62CC8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:exim:exim:4.62:*:*:*:*:*:*:*",
"matchCriteriaId": "2A03C071-87BF-4D5E-ABED-472ABAEFAC71",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:exim:exim:4.63:*:*:*:*:*:*:*",
"matchCriteriaId": "D1D96C53-989C-42C8-9E71-A206B78ED55A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:exim:exim:4.64:*:*:*:*:*:*:*",
"matchCriteriaId": "30190EAB-7140-4E0A-B7A5-8FA8BD0749C9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:exim:exim:4.65:*:*:*:*:*:*:*",
"matchCriteriaId": "E0BD63C5-C916-4D7D-AE81-7B9676FC0951",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:exim:exim:4.66:*:*:*:*:*:*:*",
"matchCriteriaId": "CCD8FE2F-8D53-407A-BB83-EB7725456D71",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:exim:exim:4.67:*:*:*:*:*:*:*",
"matchCriteriaId": "162F5CB4-1931-4236-8519-DD63A98BCEE0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:exim:exim:4.68:*:*:*:*:*:*:*",
"matchCriteriaId": "9EF06704-E078-42FA-89DA-7BCA169D0E5B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:exim:exim:4.69:*:*:*:*:*:*:*",
"matchCriteriaId": "B8F2CB6E-1ED1-4E56-9532-30D2BA6A53DD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:exim:exim:4.70:*:*:*:*:*:*:*",
"matchCriteriaId": "452E9C94-B7FF-40A9-A7F9-FC38824F6135",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:exim:exim:4.71:*:*:*:*:*:*:*",
"matchCriteriaId": "A8EB3709-D51F-46D1-99B8-CFB4C2275077",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:exim:exim:4.72:*:*:*:*:*:*:*",
"matchCriteriaId": "CBDB2156-072B-4392-9DC8-266FF1B8C7A4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:exim:exim:4.73:*:*:*:*:*:*:*",
"matchCriteriaId": "02F8A053-4578-4C45-A193-C188E45ED010",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:exim:exim:4.74:*:*:*:*:*:*:*",
"matchCriteriaId": "A5DC11D6-F67F-40A8-B8BF-2E76DD2F9091",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:exim:exim:4.75:*:*:*:*:*:*:*",
"matchCriteriaId": "5854CAF2-1587-4B91-9F9B-E2C57C22C426",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:exim:exim:4.76:*:*:*:*:*:*:*",
"matchCriteriaId": "24D504C3-139D-4627-BD72-B6B46B360CE6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:exim:exim:4.77:*:*:*:*:*:*:*",
"matchCriteriaId": "FF796BE5-380B-4DBF-A4FF-4CDF98B69C97",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:exim:exim:4.80:*:*:*:*:*:*:*",
"matchCriteriaId": "6526E201-30CC-4C12-B2B4-06EBA663D39F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:exim:exim:4.80.1:*:*:*:*:*:*:*",
"matchCriteriaId": "F02038FF-F2B1-4DE2-A7DC-7C56C5CACC47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The dmarc_process function in dmarc.c in Exim before 4.82.1, when EXPERIMENTAL_DMARC is enabled, allows remote attackers to execute arbitrary code via the From header in an email, which is passed to the expand_string function."
},
{
"lang": "es",
"value": "La funci\u00f3n dmarc_process en dmarc.c en Exim anterior a 4.82.1, cuando EXPERIMENTAL_DMARC est\u00e1 habilitado, permite a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s de la cabecera Desde en un email, lo cual es pasado a la funci\u00f3n expand_string."
}
],
"id": "CVE-2014-2957",
"lastModified": "2025-04-12T10:46:40.837",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2014-09-04T17:55:05.013",
"references": [
{
"source": "cret@cert.org",
"url": "http://git.exim.org/exim.git/commitdiff/5b7a7c051c9ab9ee7c924a611f90ef2be03e0ad0"
},
{
"source": "cret@cert.org",
"url": "http://www.openwall.com/lists/oss-security/2021/05/04/7"
},
{
"source": "cret@cert.org",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://lists.exim.org/lurker/message/20140528.122536.a31d60a4.en.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://git.exim.org/exim.git/commitdiff/5b7a7c051c9ab9ee7c924a611f90ef2be03e0ad0"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.openwall.com/lists/oss-security/2021/05/04/7"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://lists.exim.org/lurker/message/20140528.122536.a31d60a4.en.html"
}
],
"sourceIdentifier": "cret@cert.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-20"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…