First published: Wed Oct 31 2012(Updated: )
Heap-based buffer overflow in the dkim_exim_query_dns_txt function in dkim.c in Exim 4.70 through 4.80, when DKIM support is enabled and acl_smtp_connect and acl_smtp_rcpt are not set to "warn control = dkim_disable_verify," allows remote attackers to execute arbitrary code via an email from a malicious DNS server.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Exim Exim | =4.70 | |
Exim Exim | =4.71 | |
Exim Exim | =4.72 | |
Exim Exim | =4.73 | |
Exim Exim | =4.74 | |
Exim Exim | =4.75 | |
Exim Exim | =4.76 | |
Exim Exim | =4.77 | |
Exim Exim | =4.80 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.