Risk | High |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2019-16928 |
CWE-ID | CWE-122 |
Exploitation vector | Network |
Public exploit | Vulnerability #1 is being exploited in the wild. |
Vulnerable software Subscribe |
Exim Server applications / Mail servers |
Vendor | Exim |
This security bulletin contains information about 1 vulnerabilities.
EUVDB-ID: #VU21399
Risk: High
CVSSv3.1:
CVE-ID: CVE-2019-16928
CWE-ID:
CWE-122 - Heap-based Buffer Overflow
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error within the string_vformat() function in string.c when processing an overly long argument for EHLO command. A remote non-authenticated attacker can send a very long string as an argument for the EHLO command, trigger a heap-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
MitigationInstall the latest version from vendor's website.
Vulnerable software versionsExim: 4.92 - 4.92.2
http://www.openwall.com/lists/oss-security/2019/09/28/1
http://www.openwall.com/lists/oss-security/2019/09/28/2
http://www.openwall.com/lists/oss-security/2019/09/28/3
http://bugs.exim.org/show_bug.cgi?id=2449
http://git.exim.org/exim.git/commit/478effbfd9c3cc5a627fc671d4bf94d13670d65f
http://lists.exim.org/lurker/message/20190927.032457.c1044d4c.en.html
Can this vulnerability be exploited remotely?
How the attacker can exploit this vulnerability?
Is there known malware, which exploits this vulnerability?