First published: Mon May 02 2005(Updated: )
Multiple buffer overflows in Exim before 4.43 may allow attackers to execute arbitrary code via (1) an IPv6 address with more than 8 components, as demonstrated using the -be command line option, which triggers an overflow in the host_aton function, or (2) the -bh command line option or dnsdb PTR lookup, which triggers an overflow in the dns_build_reverse function.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Exim | <=4.40 | |
Exim | =4.41 | |
Exim | =4.42 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-0021 is classified as a critical vulnerability due to the potential for remote code execution.
To fix CVE-2005-0021, upgrade Exim to version 4.43 or later, as this version addresses the buffer overflow vulnerabilities.
CVE-2005-0021 affects Exim versions prior to 4.43, specifically 4.40 and any version between 4.41 and 4.42.
An attacker can exploit CVE-2005-0021 to execute arbitrary code on the vulnerable Exim server.
As of the information available, the best course of action is to update Exim to a patched version since no effective workaround is recommended.