FreshPorts - VuXML

This page displays vulnerability information about FreeBSD Ports.

The VUXML data was last processed by FreshPorts on 2024-04-19 20:48:44 UTC

List all Vulnerabilities, by package

List all Vulnerabilities, by date

k68

These are the vulnerabilities relating to the commit you have selected:

VuXML IDDescription
316b3c3e-0e98-11e8-8d41-97657151f8c2exim -- a buffer overflow vulnerability, remote code execution

Exim developers report:

There is a buffer overflow in base64d(), if some pre-conditions are met. Using a handcrafted message, remote code execution seems to be possible.


Discovery 2018-02-05
Entry 2018-02-10
exim
< 4.90.1

https://exim.org/static/doc/security/CVE-2018-6789.txt
36594c54-7be7-11e0-9838-0022156e8794Exim -- remote code execution and information disclosure

Release notes for Exim 4.76 says:

Bugzilla 1106: CVE-2011-1764 - DKIM log line was subject to a format-string attack -- SECURITY: remote arbitrary code execution.

DKIM signature header parsing was double-expanded, second time unintentionally subject to list matching rules, letting the header cause arbitrary Exim lookups (of items which can occur in lists, *not* arbitrary string expansion). This allowed for information disclosure.

Also, impact assessment was redone shortly after the original announcement:

Further analysis revealed that the second security was more severe than I realised at the time that I wrote the announcement. The second security issue has been assigned CVE-2011-1407 and is also a remote code execution flaw. For clarity: both issues were introduced with 4.70.


Discovery 2011-05-10
Entry 2011-05-14
exim
ge 4.70 lt 4.76

CVE-2011-1764
CVE-2011-1407
https://lists.exim.org/lurker/message/20110512.102909.8136175a.en.html
http://bugs.exim.org/show_bug.cgi?id=1106
3e0da406-aece-11e9-8d41-97657151f8c2Exim -- RCE in ${sort} expansion

Exim team report:

A local or remote attacker can execute programs with root privileges - if you've an unusual configuration.

If your configuration uses the ${sort } expansion for items that can be controlled by an attacker (e.g. $local_part, $domain). The default config, as shipped by the Exim developers, does not contain ${sort }.

The vulnerability is exploitable either remotely or locally and could be used to execute other programs with root privilege. The ${sort } expansion re-evaluates its items.

Exim 4.92.1 is not vulnerable.


Discovery 2019-07-18
Entry 2019-07-25
Modified 2019-07-26
exim
ge 4.85 lt 4.92.1

CVE-2019-13917
https://www.exim.org/static/doc/security/CVE-2019-13917.txt
44ccfab0-3564-11e0-8e81-0022190034c0exim -- local privilege escalation

exim.org reports:

CVE-2011-0017 - check return value of setuid/setgid. This is a privilege escalation vulnerability whereby the Exim run-time user can cause root to append content of the attacker's choosing to arbitrary files.


Discovery 2011-01-31
Entry 2011-02-10
exim
exim-ldap
exim-ldap2
exim-mysql
exim-postgresql
exim-sa-exim
< 4.74

CVE-2011-0017
ftp://ftp.exim.org/pub/exim/ChangeLogs/ChangeLog-4.74
45bea6b5-8855-11e9-8d41-97657151f8c2Exim -- RCE in deliver_message() function

Exim team and Qualys report:

We received a report of a possible remote exploit. Currently there is no evidence of an active use of this exploit.

A patch exists already, is being tested, and backported to all versions we released since (and including) 4.87.

The severity depends on your configuration. It depends on how close to the standard configuration your Exim runtime configuration is. The closer the better.

Exim 4.92 is not vulnerable.


Discovery 2019-05-27
Entry 2019-06-06
exim
ge 4.87 lt 4.92

CVE-2019-10149
https://www.exim.org/static/doc/security/CVE-2019-10149.txt
5f29c2e4-9f6a-11d8-abbc-00e08110b673exim buffer overflow when verify = header_syntax is used

A remote exploitable buffer overflow has been discovered in exim when verify = header_syntax is used in the configuration file. This does not affect the default configuration.


Discovery 2004-05-06
Entry 2004-05-06
exim
exim-ldap2
exim-mysql
exim-postgresql
< 4.33+20_1

http://www.guninski.com/exim1.html
CVE-2004-0400
61db9b88-d091-11e9-8d41-97657151f8c2Exim -- RCE with root privileges in TLS SNI handler

Exim developers report:

If your Exim server accepts TLS connections, it is vulnerable. This does not depend on the TLS libray, so both, GnuTLS and OpenSSL are affected.

The vulnerability is exploitable by sending a SNI ending in a backslash-null sequence during the initial TLS handshake. The exploit exists as a POC. For more details see the document qualys.mbx


Discovery 2019-09-02
Entry 2019-09-06
exim
< 4.92.2

https://git.exim.org/exim.git/blob_plain/2600301ba6dbac5c9d640c87007a07ee6dcea1f4:/doc/doc-txt/cve-2019-15846/cve.txt
68b29058-d348-11e7-b9fe-c13eb7bcbf4fexim -- remote code execution, deny of service in BDAT

Exim team reports:

The receive_msg function in receive.c in the SMTP daemon in Exim 4.88 and 4.89 allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free) via vectors involving BDAT commands.


Discovery 2017-11-23
Entry 2017-11-27
exim
ge 4.88 lt 4.89_2

https://bugs.exim.org/show_bug.cgi?id=2199
75dd622c-d5fd-11e7-b9fe-c13eb7bcbf4fexim -- remote DoS attack in BDAT processing

Exim developers team reports:

The receive_msg function in receive.c in the SMTP daemon in Exim 4.88 and 4.89 allows remote attackers to cause a denial of service (infinite loop and stack exhaustion) via vectors involving BDAT commands and an improper check for a '.' character signifying the end of the content, related to the bdat_getc function.


Discovery 2017-11-23
Entry 2017-11-30
exim
ge 4.88 lt 4.89.1

https://bugs.exim.org/show_bug.cgi?id=2199
CVE-2017-16944
7d09b9ee-e0ba-11e5-abc4-6fb07af136d2exim -- local privillege escalation

The Exim development team reports:

All installations having Exim set-uid root and using 'perl_startup' are vulnerable to a local privilege escalation. Any user who can start an instance of Exim (and this is normally any user) can gain root privileges. If you do not use 'perl_startup' you should be safe.


Discovery 2016-02-26
Entry 2016-03-02
exim
< 4.86.2

< 4.85.2

< 4.84.2

CVE-2016-1531
https://lists.exim.org/lurker/message/20160302.191005.a72d8433.en.html
8c1a271d-56cf-11e7-b9fe-c13eb7bcbf4fexim -- Privilege escalation via multiple memory leaks

Qualsys reports:

Exim supports the use of multiple "-p" command line arguments which are malloc()'ed and never free()'ed, used in conjunction with other issues allows attackers to cause arbitrary code execution. This affects exim version 4.89 and earlier. Please note that at this time upstream has released a patch (commit 65e061b76867a9ea7aeeb535341b790b90ae6c21), but it is not known if a new point release is available that addresses this issue at this time.


Discovery 2017-06-19
Entry 2017-06-21
exim
< 4.89_1

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000369
b0f3ab1f-1f3b-11e2-8fe9-0022156e8794Exim -- remote code execution

This vulnerability affects Exim instances built with DKIM enabled (this is the default for FreeBSD Exim port) and running verification of DKIM signatures on the incoming mail messages.

Phil Penncock reports:

This is a SECURITY release, addressing a CRITICAL remote code execution flaw in versions of Exim between 4.70 and 4.80 inclusive, when built with DKIM support (the default).

This security vulnerability can be exploited by anyone who can send email from a domain for which they control the DNS.

You are not vulnerable if you built Exim with DISABLE_DKIM or if you put this at the start of an ACL plumbed into acl_smtp_connect or acl_smtp_rcpt:

warn control = dkim_disable_verify

Discovery 2012-10-25
Entry 2012-10-26
exim
ge 4.70 lt 4.80.1

CVE-2012-5671
https://lists.exim.org/lurker/message/20121026.080330.74b9147b.en.html
ca9ce879-5ebb-11d9-a01c-0050569f0001exim -- two buffer overflow vulnerabilities

1. The function host_aton() can overflow a buffer if it is presented with an illegal IPv6 address that has more than 8 components.

2. The second report described a buffer overflow in the function spa_base64_to_bits(), which is part of the code for SPA authentication.


Discovery 2005-01-05
Entry 2005-01-05
Modified 2005-01-18
exim
exim-ldap
exim-ldap2
exim-mysql
exim-postgresql
exim-sa-exim
< 4.43+28_1

http://www.exim.org/mail-archives/exim-announce/2005/msg00000.html
http://marc.theaimsgroup.com/?l=bugtraq&m=110573573800377
CVE-2005-0021
CVE-2005-0022
12185
12188
12268
e4fcf020-0447-11e0-becc-0022156e8794exim -- local privilege escalation

David Woodhouse reports:

Secondly a privilege escalation where the trusted 'exim' user is able to tell Exim to use arbitrary config files, in which further ${run ...} commands will be invoked as root.


Discovery 2010-12-10
Entry 2011-01-08
exim
< 4.73

CVE-2010-4345
http://www.exim.org/lurker/message/20101209.022730.dbb6732d.en.html
https://bugzilla.redhat.com/show_bug.cgi?id=661756#c3
e7002b26-caaa-11e6-a76a-9f7324e5534eexim -- DKIM private key leak

The Exim project reports:

Exim leaks the private DKIM signing key to the log files. Additionally, if the build option EXPERIMENTAL_DSN_INFO=yes is used, the key material is included in the bounce message.


Discovery 2016-12-15
Entry 2016-12-25
exim
gt 4.69 lt 4.87.1

https://exim.org/static/doc/CVE-2016-9963.txt
CVE-2016-9963
e917caba-e291-11e9-89f1-152fed202bb7Exim -- heap-based buffer overflow in string_vformat leading to RCE

Exim developers team report:

There is a heap overflow in string_vformat().Using a EHLO message, remote code execution seems to be possible.


Discovery 2019-09-28
Entry 2019-09-29
exim
ge 4.92 lt 4.92.3

https://www.openwall.com/lists/oss-security/2019/09/28/1