Vulnerability Name: | CVE-2004-0400 (CCN-16077) | ||||||||||||
Assigned: | 2004-05-06 | ||||||||||||
Published: | 2004-05-06 | ||||||||||||
Updated: | 2017-07-11 | ||||||||||||
Summary: | Stack-based buffer overflow in Exim 4 before 4.33, when the headers_check_syntax option is enabled, allows remote attackers to cause a denial of service and possibly execute arbitrary code during the header check. | ||||||||||||
CVSS v3 Severity: | 7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
| ||||||||||||
CVSS v2 Severity: | 7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
| ||||||||||||
Vulnerability Type: | CWE-Other | ||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||
References: | Source: CCN Type: Full-Disclosure Mailing List, Thu May 06 2004 - 06:10:31 CDT Buffer overflows in exim, yet still exim much better than windows Source: MITRE Type: CNA CVE-2004-0400 Source: FULLDISC Type: UNKNOWN 20040506 Buffer overflows in exim, yet still exim much better than windows Source: DEBIAN Type: Patch, Vendor Advisory DSA-501 Source: DEBIAN Type: Patch, Vendor Advisory DSA-502 Source: DEBIAN Type: DSA-501 exim -- buffer overflow Source: DEBIAN Type: DSA-502 exim-tls -- buffer overflow Source: CCN Type: GLSA-200405-07 Exim verify=header_syntax buffer overflow Source: MISC Type: Exploit, Patch, Vendor Advisory http://www.guninski.com/exim1.html Source: CCN Type: GLSA 200405-07 Exim verify=header_syntax buffer overflow Source: CCN Type: OSVDB ID: 5897 Exim header_syntax Function Remote Overflow Source: CCN Type: BID-10291 Exim Header Syntax Checking Remote Stack Buffer Overrun Vulnerability Source: XF Type: UNKNOWN exim-headerschecksyntax-bo(16077) Source: XF Type: UNKNOWN exim-headerschecksyntax-bo(16077) Source: SUSE Type: SUSE-SA:2004:012 mc: local privilege escalation | ||||||||||||
Vulnerable Configuration: | Configuration 1: Denotes that component is vulnerable | ||||||||||||
Oval Definitions | |||||||||||||
| |||||||||||||
BACK |