First published: Mon May 02 2005(Updated: )
Buffer overflow in the spa_base64_to_bits function in Exim before 4.43, as originally obtained from Samba code, and as called by the auth_spa_client function, may allow attackers to execute arbitrary code during SPA authentication.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
University Of Cambridge Exim | =4.41 | |
University Of Cambridge Exim | =4.42 | |
University Of Cambridge Exim | <=4.40 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.