Vulnerability Details : CVE-2005-0021
Multiple buffer overflows in Exim before 4.43 may allow attackers to execute arbitrary code via (1) an IPv6 address with more than 8 components, as demonstrated using the -be command line option, which triggers an overflow in the host_aton function, or (2) the -bh command line option or dnsdb PTR lookup, which triggers an overflow in the dns_build_reverse function.
Vulnerability category: Execute code
Products affected by CVE-2005-0021
- cpe:2.3:a:university_of_cambridge:exim:*:*:*:*:*:*:*:*
- cpe:2.3:a:university_of_cambridge:exim:4.41:*:*:*:*:*:*:*
- cpe:2.3:a:university_of_cambridge:exim:4.42:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2005-0021
0.73%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 81 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2005-0021
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.2
|
HIGH | AV:L/AC:L/Au:N/C:C/I:C/A:C |
3.9
|
10.0
|
NIST |
References for CVE-2005-0021
-
http://www.redhat.com/support/errata/RHSA-2005-025.html
SupportPatch
-
http://www.debian.org/security/2005/dsa-637
[SECURITY] [DSA 637-1] New exim-tls packages fix arbitrary code executionVendor Advisory
-
http://ftp6.us.freebsd.org/pub/mail/exim/ChangeLogs/ChangeLog-4.44
404 Not Found
-
http://www.exim.org/mail-archives/exim-users/Week-of-Mon-20050103/msg00028.html
404 Not Found
-
http://www.idefense.com/application/poi/display?id=183&type=vulnerabilities
U.S. | Let There Be Change | AccentureExploit;Vendor Advisory
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10347
404 Not Found
-
http://security.gentoo.org/glsa/glsa-200501-23.xml
Exim: Two buffer overflows (GLSA 200501-23) — Gentoo securityVendor Advisory
-
http://www.idefense.com/application/poi/display?id=179&type=vulnerabilities
U.S. | Let There Be Change | AccentureVendor Advisory
-
http://www.debian.org/security/2005/dsa-635
[SECURITY] [DSA 635-1] New exim packages fix arbitrary code executionVendor Advisory
-
http://www.kb.cert.org/vuls/id/132992
VU#132992 - Exim vulnerable to buffer overflow via the dns_build_reverse() routinePatch;US Government Resource
Jump to