Vulnerability Name: | CVE-2005-0021 (CCN-16308) | ||||||||||||||||||||
Assigned: | 2004-05-28 | ||||||||||||||||||||
Published: | 2004-05-28 | ||||||||||||||||||||
Updated: | 2017-10-11 | ||||||||||||||||||||
Summary: | Multiple buffer overflows in Exim before 4.43 may allow attackers to execute arbitrary code via (1) an IPv6 address with more than 8 components, as demonstrated using the -be command line option, which triggers an overflow in the host_aton function, or (2) the -bh command line option or dnsdb PTR lookup, which triggers an overflow in the dns_build_reverse function. | ||||||||||||||||||||
CVSS v3 Severity: | 5.9 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
| ||||||||||||||||||||
CVSS v2 Severity: | 7.2 High (CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C)
| ||||||||||||||||||||
Vulnerability Type: | CWE-Other | ||||||||||||||||||||
Vulnerability Consequences: | Gain Privileges | ||||||||||||||||||||
References: | Source: CCN Type: BugTraq Mailing List, Fri May 28 2004 - 18:02:48 CDT EnderUNIX Security Anouncement (Isoqlog and Spamguard) Source: MITRE Type: CNA CVE-2004-2571 Source: MITRE Type: CNA CVE-2005-0021 Source: CONFIRM Type: UNKNOWN http://ftp6.us.freebsd.org/pub/mail/exim/ChangeLogs/ChangeLog-4.44 Source: CCN Type: RHSA-2005-025 exim security update Source: CCN Type: SA11741 Isoqlog Multiple Buffer Overflow Vulnerabilities Source: GENTOO Type: Vendor Advisory GLSA-200501-23 Source: CCN Type: SECTRACK ID: 1010292 Isoqlog Buffer Overflows May Let Remote Users Execute Arbitrary Code Source: CCN Type: CIAC Information Bulletin P-097 Debian Exim Buffer Overflow Source: DEBIAN Type: Vendor Advisory DSA-635 Source: DEBIAN Type: Vendor Advisory DSA-637 Source: DEBIAN Type: DSA-635 exim -- buffer overflow Source: DEBIAN Type: DSA-637 exim-tls -- buffer overflow Source: CCN Type: Isoqlog Web page EnderUNIX Software Development Team Source: MLIST Type: UNKNOWN [exim] 20050104 2 smallish security issues Source: CCN Type: GLSA-200501-23 Exim: Two buffer overflows Source: IDEFENSE Type: Vendor Advisory 20050107 Exim host_aton() Buffer Overflow Vulnerability Source: IDEFENSE Type: Exploit, Vendor Advisory 20050114 Exim dns_buld_reverse() Buffer Overflow Vulnerability Source: CCN Type: US-CERT VU#132992 Exim vulnerable to buffer overflow via the dns_build_reverse() routine Source: CERT-VN Type: Patch, US Government Resource VU#132992 Source: CCN Type: OSVDB ID: 23576 EnderUNIX isoqlog Dir.c Unspecified Function Overflow Source: CCN Type: OSVDB ID: 23577 EnderUNIX isoqlog loadconfig.c Multiple Function Overflow Source: CCN Type: OSVDB ID: 23578 EnderUNIX isoqlog LangCfg.c LoadLang Function Overflow Source: CCN Type: OSVDB ID: 23579 EnderUNIX isoqlog Html.c Unspecified Function Overflow Source: CCN Type: OSVDB ID: 6534 EnderUNIX isoqlog Parser.c Multiple Function Remote Overflow Source: REDHAT Type: Patch RHSA-2005:025 Source: CCN Type: BID-10433 Isoqlog Multiple Buffer Overflow Vulnerabilities Source: CCN Type: USN-56-1 exim4 vulnerabilities Source: XF Type: UNKNOWN isoqlog-multiple-bo(16308) Source: OVAL Type: UNKNOWN oval:org.mitre.oval:def:10347 Source: SUSE Type: SUSE-SR:2005:002 SUSE Security Summary Report | ||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration RedHat 1: Denotes that component is vulnerable | ||||||||||||||||||||
Vulnerability Name: | CVE-2005-0021 (CCN-18763) | ||||||||||||||||||||
Assigned: | 2005-01-04 | ||||||||||||||||||||
Published: | 2005-01-04 | ||||||||||||||||||||
Updated: | 2005-01-04 | ||||||||||||||||||||
Summary: | Multiple buffer overflows in Exim before 4.43 may allow attackers to execute arbitrary code via (1) an IPv6 address with more than 8 components, as demonstrated using the -be command line option, which triggers an overflow in the host_aton function, or (2) the -bh command line option or dnsdb PTR lookup, which triggers an overflow in the dns_build_reverse function. | ||||||||||||||||||||
CVSS v3 Severity: | 5.9 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
| ||||||||||||||||||||
CVSS v2 Severity: | 7.2 High (CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C)
| ||||||||||||||||||||
Vulnerability Consequences: | Gain Privileges | ||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2005-0021 Source: CCN Type: RHSA-2005-025 exim security update Source: CCN Type: CIAC Information Bulletin P-097 Debian Exim Buffer Overflow Source: DEBIAN Type: DSA-635 exim -- buffer overflow Source: DEBIAN Type: DSA-637 exim-tls -- buffer overflow Source: CCN Type: Exim-Announce Mailing List, Tue, 4 Jan 2005 14:54:45 +0000 (GMT) [exim-announce] 2 smallish security issues Source: CCN Type: GLSA-200501-23 Exim: Two buffer overflows Source: CCN Type: US-CERT VU#132992 Exim vulnerable to buffer overflow via the dns_build_reverse() routine Source: CCN Type: BID-12185 Exim Illegal IPv6 Address Buffer Overflow Vulnerability Source: CCN Type: USN-56-1 exim4 vulnerabilities Source: XF Type: UNKNOWN exim-hostaton-bo(18763) Source: SUSE Type: SUSE-SR:2005:002 SUSE Security Summary Report | ||||||||||||||||||||
Vulnerable Configuration: | Configuration RedHat 1: Denotes that component is vulnerable | ||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||
| |||||||||||||||||||||
BACK |