Vulnerability Details : CVE-2011-1764
Format string vulnerability in the dkim_exim_verify_finish function in src/dkim.c in Exim before 4.76 might allow remote attackers to execute arbitrary code or cause a denial of service (daemon crash) via format string specifiers in data used in DKIM logging, as demonstrated by an identity field containing a % (percent) character.
Vulnerability category: OverflowExecute codeDenial of service
Products affected by CVE-2011-1764
- cpe:2.3:a:exim:exim:*:*:*:*:*:*:*:*
- cpe:2.3:a:exim:exim:4.10:*:*:*:*:*:*:*
- cpe:2.3:a:exim:exim:4.20:*:*:*:*:*:*:*
- cpe:2.3:a:exim:exim:4.68:*:*:*:*:*:*:*
- cpe:2.3:a:exim:exim:4.67:*:*:*:*:*:*:*
- cpe:2.3:a:exim:exim:4.60:*:*:*:*:*:*:*
- cpe:2.3:a:exim:exim:4.54:*:*:*:*:*:*:*
- cpe:2.3:a:exim:exim:4.34:*:*:*:*:*:*:*
- cpe:2.3:a:exim:exim:4.41:*:*:*:*:*:*:*
- cpe:2.3:a:exim:exim:4.42:*:*:*:*:*:*:*
- cpe:2.3:a:exim:exim:4.64:*:*:*:*:*:*:*
- cpe:2.3:a:exim:exim:4.63:*:*:*:*:*:*:*
- cpe:2.3:a:exim:exim:4.51:*:*:*:*:*:*:*
- cpe:2.3:a:exim:exim:4.70:*:*:*:*:*:*:*
- cpe:2.3:a:exim:exim:4.69:*:*:*:*:*:*:*
- cpe:2.3:a:exim:exim:4.62:*:*:*:*:*:*:*
- cpe:2.3:a:exim:exim:4.61:*:*:*:*:*:*:*
- cpe:2.3:a:exim:exim:4.44:*:*:*:*:*:*:*
- cpe:2.3:a:exim:exim:4.43:*:*:*:*:*:*:*
- cpe:2.3:a:exim:exim:4.21:*:*:*:*:*:*:*
- cpe:2.3:a:exim:exim:4.33:*:*:*:*:*:*:*
- cpe:2.3:a:exim:exim:4.50:*:*:*:*:*:*:*
- cpe:2.3:a:exim:exim:4.23:*:*:*:*:*:*:*
- cpe:2.3:a:exim:exim:4.22:*:*:*:*:*:*:*
- cpe:2.3:a:exim:exim:4.32:*:*:*:*:*:*:*
- cpe:2.3:a:exim:exim:4.40:*:*:*:*:*:*:*
- cpe:2.3:a:exim:exim:4.66:*:*:*:*:*:*:*
- cpe:2.3:a:exim:exim:4.65:*:*:*:*:*:*:*
- cpe:2.3:a:exim:exim:4.53:*:*:*:*:*:*:*
- cpe:2.3:a:exim:exim:4.52:*:*:*:*:*:*:*
- cpe:2.3:a:exim:exim:4.31:*:*:*:*:*:*:*
- cpe:2.3:a:exim:exim:4.30:*:*:*:*:*:*:*
- cpe:2.3:a:exim:exim:4.24:*:*:*:*:*:*:*
- cpe:2.3:a:exim:exim:4.11:*:*:*:*:*:*:*
- cpe:2.3:a:exim:exim:4.12:*:*:*:*:*:*:*
- cpe:2.3:a:exim:exim:4.00:*:*:*:*:*:*:*
- cpe:2.3:a:exim:exim:3.36:*:*:*:*:*:*:*
- cpe:2.3:a:exim:exim:3.21:*:*:*:*:*:*:*
- cpe:2.3:a:exim:exim:3.20:*:*:*:*:*:*:*
- cpe:2.3:a:exim:exim:3.10:*:*:*:*:*:*:*
- cpe:2.3:a:exim:exim:3.03:*:*:*:*:*:*:*
- cpe:2.3:a:exim:exim:4.02:*:*:*:*:*:*:*
- cpe:2.3:a:exim:exim:4.01:*:*:*:*:*:*:*
- cpe:2.3:a:exim:exim:3.31:*:*:*:*:*:*:*
- cpe:2.3:a:exim:exim:3.30:*:*:*:*:*:*:*
- cpe:2.3:a:exim:exim:3.22:*:*:*:*:*:*:*
- cpe:2.3:a:exim:exim:3.12:*:*:*:*:*:*:*
- cpe:2.3:a:exim:exim:3.11:*:*:*:*:*:*:*
- cpe:2.3:a:exim:exim:2.11:*:*:*:*:*:*:*
- cpe:2.3:a:exim:exim:2.10:*:*:*:*:*:*:*
- cpe:2.3:a:exim:exim:4.04:*:*:*:*:*:*:*
- cpe:2.3:a:exim:exim:4.03:*:*:*:*:*:*:*
- cpe:2.3:a:exim:exim:3.33:*:*:*:*:*:*:*
- cpe:2.3:a:exim:exim:3.32:*:*:*:*:*:*:*
- cpe:2.3:a:exim:exim:3.14:*:*:*:*:*:*:*
- cpe:2.3:a:exim:exim:3.13:*:*:*:*:*:*:*
- cpe:2.3:a:exim:exim:3.00:*:*:*:*:*:*:*
- cpe:2.3:a:exim:exim:2.12:*:*:*:*:*:*:*
- cpe:2.3:a:exim:exim:4.14:*:*:*:*:*:*:*
- cpe:2.3:a:exim:exim:4.05:*:*:*:*:*:*:*
- cpe:2.3:a:exim:exim:3.35:*:*:*:*:*:*:*
- cpe:2.3:a:exim:exim:3.34:*:*:*:*:*:*:*
- cpe:2.3:a:exim:exim:3.16:*:*:*:*:*:*:*
- cpe:2.3:a:exim:exim:3.15:*:*:*:*:*:*:*
- cpe:2.3:a:exim:exim:3.02:*:*:*:*:*:*:*
- cpe:2.3:a:exim:exim:3.01:*:*:*:*:*:*:*
- cpe:2.3:a:exim:exim:4.71:*:*:*:*:*:*:*
- cpe:2.3:a:exim:exim:4.74:*:*:*:*:*:*:*
- cpe:2.3:a:exim:exim:4.72:*:*:*:*:*:*:*
- cpe:2.3:a:exim:exim:4.73:*:*:*:*:*:*:*
Threat overview for CVE-2011-1764
Top countries where our scanners detected CVE-2011-1764
Top open port discovered on systems with this issue
80
IPs affected by CVE-2011-1764 2,068
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2011-1764!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2011-1764
9.72%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 95 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2011-1764
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
CWE ids for CVE-2011-1764
-
The product uses a function that accepts a format string as an argument, but the format string originates from an external source.Assigned by: nvd@nist.gov (Primary)
References for CVE-2011-1764
-
https://bugzilla.redhat.com/show_bug.cgi?id=702474
702474 – (CVE-2011-1764) CVE-2011-1764 exim: improper format string handling in DKIM signaturesPatch
-
http://www.debian.org/security/2011/dsa-2232
Debian -- Security Information -- DSA-2232-1 exim4
-
http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00005.html
[security-announce] SUSE Security Summary Report: SUSE-SR:2011:009
-
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=624670
#624670 - exim4 dkim plugin - % in dkim signature logged to paniclog - Debian Bug report logsPatch
-
http://git.exim.org/exim.git/commit/337e3505b0e6cd4309db6bf6062b33fa56e06cf8
git.exim.org Git - exim.git/commitPatch
-
http://bugs.exim.org/show_bug.cgi?id=1106
Bug 1106 – % in dkim signature logged to paniclogPatch
Jump to