First published: Sun Aug 07 2022(Updated: )
Exim before 4.95 has a heap-based buffer overflow for the alias list in host_name_lookup in host.c when sender_host_name is set.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Exim Exim | <4.95 | |
Debian Debian Linux | =10.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-37452 is a vulnerability in the Exim email server that allows a heap-based buffer overflow when handling the alias list in host name lookup.
CVE-2022-37452 has a severity rating of 9.8, which is considered critical.
Exim versions up to exclusive 4.95 and Debian Linux version 10.0 are affected by CVE-2022-37452.
To fix CVE-2022-37452, it is recommended to update to Exim version 4.95 or higher, or apply the necessary patches provided by the vendor.
CVE-2022-37452 is associated with CWE-119 (Improper Restriction of Operations within the Bounds of a Memory Buffer) and CWE-787 (Out-of-bounds Write).