Vulnerability Name: | CVE-2018-6789 (CCN-138800) | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Assigned: | 2018-02-07 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Published: | 2018-02-07 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Updated: | 2021-06-03 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Summary: | An issue was discovered in the base64d function in the SMTP listener in Exim before 4.90.1. By sending a handcrafted message, a buffer overflow may happen. This can be used to execute code remotely. | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
CVSS v3 Severity: | 9.8 Critical (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) 8.9 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:U/RC:R)
6.6 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:U/RC:R)
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
CVSS v2 Severity: | 7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerability Type: | CWE-119 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2018-6789 Source: CONFIRM Type: Mailing List, Third Party Advisory http://openwall.com/lists/oss-security/2018/02/10/2 Source: MISC Type: UNKNOWN http://packetstormsecurity.com/files/162959/Exim-base64d-Buffer-Overflow.html Source: CCN Type: oss-sec Mailing List, Wed, 7 Feb 2018 11:39:43 +0100 CVE-2018-6789 Exim 4.90 and earlier: buffer overflow Source: MLIST Type: Mailing List, Third Party Advisory [oss-security] 20180207 CVE-2018-6789 Exim 4.90 and earlier: buffer overflow Source: BID Type: Third Party Advisory, VDB Entry 103049 Source: CCN Type: BID-103049 Exim 'base64d()' Function Buffer Overflow Vulnerability Source: SECTRACK Type: Third Party Advisory, VDB Entry 1040461 Source: MISC Type: Technical Description, Third Party Advisory https://devco.re/blog/2018/03/06/exim-off-by-one-RCE-exploiting-CVE-2018-6789-en/ Source: XF Type: UNKNOWN exim-cve20186789-bo(138800) Source: CONFIRM Type: Vendor Advisory https://exim.org/static/doc/security/CVE-2018-6789.txt Source: CONFIRM Type: Patch, Vendor Advisory https://git.exim.org/exim.git/commit/cf3cd306062a08969c41a1cdd32c6855f1abecf1 Source: MLIST Type: Mailing List, Third Party Advisory [debian-lts-announce] 20180210 [SECURITY] [DLA 1274-1] exim4 security update Source: CCN Type: Packet Storm Security [05-03-2018] Exim base64d Remote Code Execution Source: CCN Type: Packet Storm Security [10-24-2018] Exim 4.90 Remote Code Execution Source: CCN Type: Packet Storm Security [06-03-2021] Exim base64d Buffer Overflow Source: UBUNTU Type: Third Party Advisory USN-3565-1 Source: CCN Type: CYBERSECURITY & INFRASTRUCTURE SECURITY AGENCY KNOWN EXPLOITED VULNERABILITIES CATALOG Source: DEBIAN Type: Third Party Advisory DSA-4110 Source: CCN Type: Exim Web site Exim Internet Mailer Source: EXPLOIT-DB Type: EXPLOIT Offensive Security Exploit Database [05-02-2018] Source: EXPLOIT-DB Type: Exploit, Third Party Advisory, VDB Entry 44571 Source: EXPLOIT-DB Type: EXPLOIT Offensive Security Exploit Database [10-24-2018] Source: EXPLOIT-DB Type: Exploit, Third Party Advisory, VDB Entry 45671 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration 3: Configuration CCN 1: ![]() | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
BACK |