Vulnerability Details : CVE-2019-16928
Exim 4.92 through 4.92.2 allows remote code execution, a different vulnerability than CVE-2019-15846. There is a heap-based buffer overflow in string_vformat in string.c involving a long EHLO command.
Vulnerability category: OverflowExecute code
Products affected by CVE-2019-16928
- cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
- cpe:2.3:a:exim:exim:*:*:*:*:*:*:*:*
Threat overview for CVE-2019-16928
Top countries where our scanners detected CVE-2019-16928
Top open port discovered on systems with this issue
80
IPs affected by CVE-2019-16928 9,648
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2019-16928!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
CVE-2019-16928 is in the CISA Known Exploited Vulnerabilities Catalog
CISA vulnerability name:
Exim Out-of-bounds Write Vulnerability
CISA required action:
Apply updates per vendor instructions.
CISA description:
Exim contains an out-of-bounds write vulnerability which can allow for remote code execution.
Notes:
https://nvd.nist.gov/vuln/detail/CVE-2019-16928
Added on
2022-03-03
Action due date
2022-03-17
Exploit prediction scoring system (EPSS) score for CVE-2019-16928
61.70%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 98 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2019-16928
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST | |
9.8
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
NIST |
CWE ids for CVE-2019-16928
-
The product writes data past the end, or before the beginning, of the intended buffer.Assigned by: nvd@nist.gov (Primary)
References for CVE-2019-16928
-
https://seclists.org/bugtraq/2019/Sep/60
Bugtraq: [SECURITY] [DSA 4536-1] exim4 security updateMailing List;Third Party Advisory
-
https://bugs.exim.org/show_bug.cgi?id=2449
Bug 2449 – Heap OverflowIssue Tracking;Patch;Vendor Advisory
-
https://usn.ubuntu.com/4141-1/
USN-4141-1: Exim vulnerability | Ubuntu security noticesThird Party Advisory
-
https://git.exim.org/exim.git/commit/478effbfd9c3cc5a627fc671d4bf94d13670d65f
git.exim.org Git - exim.git/commitPatch
-
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UY6HPRW7MR3KBQ5JFHH6OXM7YCZBJCOB/
[SECURITY] Fedora 31 Update: exim-4.92.3-1.fc31 - package-announce - Fedora mailing-listsRelease Notes
-
http://www.openwall.com/lists/oss-security/2019/09/28/4
oss-security - Re: Exim CVE-2019-16928 RCE using a heap-based buffer overflowMailing List;Third Party Advisory
-
http://www.openwall.com/lists/oss-security/2019/09/28/2
oss-security - Re: Exim CVE-2019-16928 RCE using a heap-based buffer overflowExploit;Mailing List;Third Party Advisory
-
https://www.debian.org/security/2019/dsa-4536
Debian -- Security Information -- DSA-4536-1 exim4Third Party Advisory
-
https://security.gentoo.org/glsa/202003-47
Exim: Heap-based buffer overflow (GLSA 202003-47) — Gentoo securityThird Party Advisory
-
http://www.openwall.com/lists/oss-security/2019/09/28/3
oss-security - Re: Exim CVE-2019-16928 RCE using a heap-based buffer overflowMailing List;Third Party Advisory
-
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EED7HM3MFIBAP5OIMJAFJ35JAJABTVSC/
[SECURITY] Fedora 29 Update: exim-4.92.3-1.fc29 - package-announce - Fedora mailing-listsRelease Notes
-
https://lists.exim.org/lurker/message/20190927.032457.c1044d4c.en.html
[exim-dev] [Bug 2449] New: Heap OverflowVendor Advisory
-
http://www.openwall.com/lists/oss-security/2019/09/28/1
oss-security - Exim CVE-2019-16928 RCE using a heap-based buffer overflowExploit;Mailing List;Mitigation;Third Party Advisory
-
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T3TJW4HPYH3O5HZCWGD6NSHTEBTTAPDC/
[SECURITY] Fedora 30 Update: exim-4.92.3-1.fc30 - package-announce - Fedora Mailing-ListsMailing List;Third Party Advisory
-
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UY6HPRW7MR3KBQ5JFHH6OXM7YCZBJCOB/
[SECURITY] Fedora 31 Update: exim-4.92.3-1.fc31 - package-announce - Fedora Mailing-ListsMailing List;Third Party Advisory
-
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T3TJW4HPYH3O5HZCWGD6NSHTEBTTAPDC/
[SECURITY] Fedora 30 Update: exim-4.92.3-1.fc30 - package-announce - Fedora mailing-listsRelease Notes
-
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EED7HM3MFIBAP5OIMJAFJ35JAJABTVSC/
[SECURITY] Fedora 29 Update: exim-4.92.3-1.fc29 - package-announce - Fedora Mailing-ListsMailing List;Third Party Advisory
Jump to