First published: Thu Dec 09 2010(Updated: )
Heap-based buffer overflow in the string_vformat function in string.c in Exim before 4.70 allows remote attackers to execute arbitrary code via an SMTP session that includes two MAIL commands in conjunction with a large message containing crafted headers, leading to improper rejection logging.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
sa-exim | ||
sa-exim | =2.11 | |
sa-exim | =4.66 | |
sa-exim | =4.10 | |
sa-exim | =3.16 | |
sa-exim | =3.21 | |
sa-exim | =3.01 | |
sa-exim | =3.31 | |
sa-exim | =4.24 | |
sa-exim | =3.33 | |
sa-exim | =3.30 | |
sa-exim | =4.30 | |
sa-exim | =4.21 | |
sa-exim | =4.03 | |
sa-exim | =4.51 | |
sa-exim | =4.67 | |
sa-exim | =4.63 | |
sa-exim | =4.00 | |
sa-exim | =4.43 | |
sa-exim | =4.22 | |
sa-exim | =3.10 | |
sa-exim | =4.40 | |
sa-exim | =4.52 | |
sa-exim | =3.36 | |
sa-exim | =3.15 | |
sa-exim | =4.60 | |
sa-exim | =4.61 | |
sa-exim | =2.12 | |
sa-exim | =4.68 | |
sa-exim | =4.54 | |
sa-exim | =4.02 | |
sa-exim | =4.23 | |
sa-exim | =4.01 | |
sa-exim | =3.34 | |
sa-exim | <=4.69 | |
sa-exim | =3.00 | |
sa-exim | =4.62 | |
sa-exim | =3.02 | |
sa-exim | =3.03 | |
sa-exim | =3.12 | |
sa-exim | =3.20 | |
sa-exim | =4.12 | |
sa-exim | =3.22 | |
sa-exim | =4.32 | |
sa-exim | =4.11 | |
sa-exim | =4.42 | |
sa-exim | =4.05 | |
sa-exim | =4.31 | |
sa-exim | =3.14 | |
sa-exim | =3.11 | |
sa-exim | =3.35 | |
sa-exim | =4.44 | |
sa-exim | =4.14 | |
sa-exim | =4.64 | |
sa-exim | =4.04 | |
sa-exim | =4.41 | |
sa-exim | =4.20 | |
sa-exim | =2.10 | |
sa-exim | =4.65 | |
sa-exim | =4.53 | |
sa-exim | =4.33 | |
sa-exim | =3.13 | |
sa-exim | =4.50 | |
sa-exim | =3.32 | |
sa-exim | =4.34 | |
sa-exim | <4.70 | |
openSUSE | =11.1 | |
openSUSE | =11.2 | |
openSUSE | =11.3 | |
Debian | =5.0 | |
Ubuntu | =6.06 | |
Ubuntu | =8.04 | |
Ubuntu | =9.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-4344 is rated as a high severity vulnerability that allows remote code execution due to a heap-based buffer overflow.
To fix CVE-2010-4344, upgrade Exim to version 4.70 or later.
CVE-2010-4344 affects various versions of Exim prior to 4.70, including Exim 2.11 through 4.69.
Yes, CVE-2010-4344 can be exploited remotely through an SMTP session with specially crafted MAIL commands.
CVE-2010-4344 is classified as a buffer overflow vulnerability.