Vulnerability Details : CVE-2004-0400
Potential exploit
Stack-based buffer overflow in Exim 4 before 4.33, when the headers_check_syntax option is enabled, allows remote attackers to cause a denial of service and possibly execute arbitrary code during the header check.
Vulnerability category: OverflowExecute codeDenial of service
Products affected by CVE-2004-0400
- cpe:2.3:a:university_of_cambridge:exim:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2004-0400
3.01%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 91 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2004-0400
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
References for CVE-2004-0400
-
http://www.debian.org/security/2004/dsa-501
Debian -- The Universal Operating SystemPatch;Vendor Advisory
-
http://www.debian.org/security/2004/dsa-502
Debian -- The Universal Operating SystemPatch;Vendor Advisory
-
http://www.guninski.com/exim1.html
Buffer overflows in exim, yet still exim much better than windowsExploit;Patch;Vendor Advisory
-
http://lists.grok.org.uk/pipermail/full-disclosure/2004-May/021015.html
[Full-Disclosure] Mailing List Charter
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/16077
Exim header_check_syntax buffer overflow CVE-2004-0400 Vulnerability Report
Jump to