First published: Mon May 02 2005(Updated: )
Buffer overflow in the spa_base64_to_bits function in Exim before 4.43, as originally obtained from Samba code, and as called by the auth_spa_client function, may allow attackers to execute arbitrary code during SPA authentication.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Exim | =4.41 | |
Exim | =4.42 | |
Exim | <=4.40 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-0022 has been classified as a high severity vulnerability due to its potential to allow arbitrary code execution.
To fix CVE-2005-0022, you should update Exim to version 4.43 or later, which includes patches for this vulnerability.
CVE-2005-0022 affects Exim versions prior to 4.43, specifically versions 4.40 and earlier, as well as versions 4.41 and 4.42.
CVE-2005-0022 can be exploited through a buffer overflow attack during SPA authentication, allowing attackers to execute arbitrary code.
Exim is developed by the University of Cambridge, which is responsible for addressing vulnerabilities like CVE-2005-0022.