Plugin ID | 80 |
Plugin name | Exim 3.0 to 4.20 EHLO/HELO remote headp corruption |
Plugin filename | Exim 3.0 to 4.20 EHLO-HELO remote headp corruption.plugin |
Plugin filesize | 2947 bytes |
Plugin family | SMTP |
Plugin created name | Marc Ruef |
Plugin created email | marc dot ruef at computec dot ch |
Plugin created web | http://www.computec.ch |
Plugin created company | computec.ch |
Plugin created date | 2004/03/23 |
Plugin updated name | Marc Ruef |
Plugin updated email | marc dot ruef at computec dot ch |
Plugin updated web | http://www.computec.ch |
Plugin updated company | computec.ch |
Plugin updated date | 2004/11/13 |
Plugin version | 1.2 |
Plugin changelog | Corrected the plugin structure and added the accuracy values in 1.2 |
Plugin protocol | tcp |
Plugin port | 25 |
Plugin procedure detection | open|sleep|close|pattern_exists 220 *Exim 3.* OR 220 *Exim 4.10* OR 220 *Exim 4.20* |
Plugin detection accuracy | 80 |
Plugin comment | This plugin was written with the ATK Attack Editor. |
Bug advisory | http://www.securityfocus.com/archive/1/335790 |
Bug affected | Exim MTA 3.0 to 4.20 |
Bug not affected | Exim MTA 4.20 and newer |
Bug vulnerability class | Buffer Overflow |
Bug description | Exim is an well-known open-source Mail Transfer Agent (MTA) for Unix systems. Due to insufficient bounds checking when handling user-supplied SMTP EHLO/HELO data a heap corruption can occur. It may be possible to overrun the bounds of a heap memory buffer and run arbritrary code with server privileges. It may also possible to cause a denial of service. |
Bug solution | Patches have been released for Exim version 3.36 and 4.20. The vendor has reported that these patches will likely work on earlier versions as well. Users are advised to upgrade as soon as possible to version 4.21 or newer. |
Bug fixing time | 1 hour |
Bug exploit availability | Yes |
Bug exploit url | http://www.securityfocus.com/bid/8518/exploit/ |
Bug remote | Yes |
Bug local | Yes |
Bug severity | High |
Bug popularity | 8 |
Bug simplicity | 8 |
Bug impact | 9 |
Bug risk | 8 |
Source CVE | CAN-2003-0743 |
Source SecurityFocus BID | 8518 |
Source Literature | Hacking Exposed: Network Security Secrets & Solutions, Stuart McClure, Joel Scambray and George Kurtz, February 25, 2003, 4th Edition, McGraw-Hill Osborne Media, ISBN 0072227427 |
Source Misc. | http://www.computec.ch |