First published: Fri Sep 27 2019(Updated: )
Exim 4.92 through 4.92.2 allows remote code execution, a different vulnerability than CVE-2019-15846. There is a heap-based buffer overflow in string_vformat in string.c involving a long EHLO command.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Exim Exim | >=4.92<=4.92.2 | |
Canonical Ubuntu Linux | =19.04 | |
Debian Debian Linux | =10.0 | |
Fedoraproject Fedora | =29 | |
Fedoraproject Fedora | =30 | |
Fedoraproject Fedora | =31 | |
Exim Exim Internet Mailer | ||
debian/exim4 | 4.94.2-7+deb11u3 4.94.2-7+deb11u4 4.96-15+deb12u6 4.96-15+deb12u5 4.98-2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-16928 is an Exim vulnerability that allows remote code execution through a heap-based buffer overflow in string_vformat.
CVE-2019-16928 is classified as critical with a severity value of 9.8.
Exim Internet Mailer versions 4.92 through 4.92.2, Canonical Ubuntu Linux 19.04, Debian Linux 10.0, and Fedora versions 29, 30, and 31 are affected by CVE-2019-16928.
To fix CVE-2019-16928, you should update to the latest versions of the affected software, such as Exim 4.92-8+deb10u6 or higher, Exim 4.92-8+deb10u8 or higher, Exim 4.94.2-7 or higher, Exim 4.94.2-7+deb11u1 or higher, Exim 4.96-15+deb12u1 or higher, Exim 4.96-15+deb12u2 or higher, or Exim 4.97~RC2-2 or higher, depending on your software version.
You can find more information about CVE-2019-16928 at the following references: [Openwall 1](http://www.openwall.com/lists/oss-security/2019/09/28/1), [Openwall 2](http://www.openwall.com/lists/oss-security/2019/09/28/2), [Openwall 3](http://www.openwall.com/lists/oss-security/2019/09/28/3).