Plugin ID | 79 |
Plugin name | Exim 3.35 to 4.10 daemon_go() format string |
Plugin filename | Exim 3.35 to 4.10 daemon_go format string.plugin |
Plugin filesize | 3141 bytes |
Plugin family | SMTP |
Plugin created name | Marc Ruef |
Plugin created email | marc dot ruef at computec dot ch |
Plugin created web | http://www.computec.ch |
Plugin created company | computec.ch |
Plugin created date | 2004/03/23 |
Plugin updated name | Marc Ruef |
Plugin updated email | marc dot ruef at computec dot ch |
Plugin updated web | http://www.computec.ch |
Plugin updated company | computec.ch |
Plugin updated date | 2004/11/13 |
Plugin version | 1.3 |
Plugin changelog | Corrected the plugin structure and added the accuracy values in 1.3 |
Plugin protocol | tcp |
Plugin port | 25 |
Plugin procedure detection | open|sleep|close|pattern_exists 220 *Exim 3.35* OR 220 *Exim 3.36* OR 220 *Exim 4.10* |
Plugin detection accuracy | 80 |
Plugin comment | This plugin was written with the ATK Attack Editor. |
Bug advisory | http://www.securityfocus.com/archive/1/302101 |
Bug affected | Exim MTA 3.5 to 4.10 |
Bug not affected | Exim MTA 4.10 and newer |
Bug vulnerability class | Format String |
Bug description | Exim is an well-known open-source Mail Transfer Agent (MTA) for Unix systems. It has been discovered that there is a format string vulnerability in the daemon_go() function. This attack is possible by sending the malicous requests over the command line. An attacker may run arbritrary code and get root privileges. It should be noted that the execution of the affected function is limited to the user defined as exim-admin-user. This one must be defined at compile time. |
Bug solution | The vendor released patches to fix the vulnerability. Users with affected systems should update as soon as possible. The Exim Patch for 3.36 can be found at http://downloads.securityfocus.com/vulnerabilities/patches/exim336.patch and for 4.10 at http://downloads.securityfocus.com/vulnerabilities/patches/exim410.patch. |
Bug fixing time | 1 hour |
Bug exploit availability | Yes |
Bug exploit url | http://www.securityfocus.com/data/vulnerabilities/exploits/hoagie_exim.c |
Bug remote | Yes |
Bug local | Yes |
Bug severity | Medium |
Bug popularity | 6 |
Bug simplicity | 7 |
Bug impact | 9 |
Bug risk | 6 |
Source SecurityFocus BID | 6314 |
Source Literature | Hacking Exposed: Network Security Secrets & Solutions, Stuart McClure, Joel Scambray and George Kurtz, February 25, 2003, 4th Edition, McGraw-Hill Osborne Media, ISBN 0072227427 |
Source Misc. | http://www.computec.ch |