#VU10442 Buffer overflow in Exim - CVE-2018-6789
Published: February 9, 2018 / Updated: February 20, 2022
Vulnerability identifier: #VU10442
Vulnerability risk: High
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:A/U:Amber
CVE-ID: CVE-2018-6789
CWE-ID: CWE-120
Exploitation vector: Remote access
Exploit availability:
The vulnerability is being exploited in the wild
Vulnerable software:
Exim
Exim
Software vendor:
Exim
Exim
Description
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The weakness exists in the SMTP listener due to improper bounds checking. A remote attacker can send a specially crafted message, trigger buffer overflow and execute arbitrary code with privileges of the Exim user.
Successful exploitation of the vulnerability may result in system compromise.
The weakness exists in the SMTP listener due to improper bounds checking. A remote attacker can send a specially crafted message, trigger buffer overflow and execute arbitrary code with privileges of the Exim user.
Successful exploitation of the vulnerability may result in system compromise.
Remediation
Update to version 4.90.1.