|
|||
Rule General Information |
---|
Release Date: | 2018-08-14 | |
Rule Name: | EXPLOIT Exim Internet Mailer Remote Code Execution Vulnerability (CVE-2018-6789) | |
Severity: | ||
CVE ID: | ||
Rule Protection Details |
---|
Description: | An issue was discovered in the base64d function in the SMTP listener in Exim before 4.90.1. By sending a handcrafted message, a buffer overflow may happen. This can be used to execute code remotely. | |
Impact: | An attacker can execute arbitrary code via a successful exploit in the context of the vulnerable software. | |
Affected OS: | Network Device, Solaris, FreeBSD, Windows, Mac OS, iOS, Other Unix, Linux, Others, Android | |
Reference: | http://openwall.com/lists/oss-security/2018/02/10/2 http://www.openwall.com/lists/oss-security/2018/02/07/2 SecurityFocusBID:103049 SecurityTrackerID:1040461 https://devco.re/blog/2018/03/06/exim-off-by-one-RCE-exploiting-CVE-2018-6789-en/ https://exim.org/static/doc/security/CVE-2018-6789.txt https://git.exim.org/exim.git/commit/cf3cd306062a08969c41a1cdd32c6855f1abecf1 https://lists.debian.org/debian-lts-announce/2018/02/msg00009.html https://usn.ubuntu.com/3565-1/ https://www.debian.org/security/2018/dsa-4110 ExploitDB:44571 |
|
Solutions |
---|
Upgrading to 4.90.1 and later version to resolve the problem. |