The OpenNET Project
 
Search (keywords):  SOFT ARTICLES TIPS & TRICKS SECURITY
LINKS NEWS MAN DOCUMENTATION


[UNIX] Exim Buffer Overflows (sender_verify, headers_check_syntax)


<< Previous INDEX Search src Set bookmark Go to bookmark Next >>
Date: 6 May 2004 18:37:37 +0200
From: SecuriTeam <[email protected]>
To: [email protected]
Subject: [UNIX] Exim Buffer Overflows (sender_verify, headers_check_syntax)

The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion

The SecuriTeam alerts list - Free, Accurate, Independent.

Get your security news from a reliable source.
http://www.securiteam.com/mailinglist.html 

- - - - - - - - -



  Exim Buffer Overflows (sender_verify, headers_check_syntax)
------------------------------------------------------------------------


SUMMARY

" <http://www.exim.org/>; Exim is a message transfer agent (MTA) developed 
at the University of Cambridge for use on Unix systems connected to the 
Internet. It is freely available under the terms of the GNU General Public 
License. In style it is similar to Smail 3, but its facilities are more 
general. There is a great deal of flexibility in the way mail can be 
routed, and there are extensive facilities for checking incoming mail. 
Exim can be installed in place of Sendmail, although the configuration of 
Exim is quite different to that of Sendmail."

Two buffer overflow vulnerabilities have been found in Exim. The 
vulnerabilities cannot be exploited by default, as they require special 
functionality to be enabled (that are not enabled by default).

DETAILS

Vulnerable Systems:
 * Exim version 3.35 and prior (both vulnerabilities)
 * Exim version 4.32 and prior (2nd vulnerability only)

Georgi Guninski has reported two vulnerabilities in Exim that can be 
exploited by malicious attacker.

1) By issuing a malformed MAIL FROM address, an attacker can exploit a 
buffer overflow vulnerability if the setting of "sender_verify" is set to 
"true" (this is not default setting) in the exim.conf file.

2) Due to insufficient checking on the length of the user provided data, 
an out of bounds pointer can be accessed. This vulnerability requires that 
"headers_check_syntax" or "require verify = header_syntax" (for Exim 4.xx) 
is set (this is not default setting) in the exim.conf file.

Exploits:
Exploit codes can be found in the original article.


ADDITIONAL INFORMATION

The information has been provided by  <mailto:[email protected]> 
Georgi Guninski.

The original article can be found at:  
<http://www.guninski.com/exim1.html>; http://www.guninski.com/exim1.html




This bulletin is sent to members of the SecuriTeam mailing list. To unsubscribe from the list, send mail with an empty subject line and body to: [email protected] In order to subscribe to the mailing list, simply forward this email to: [email protected]

DISCLAIMER: The information in this bulletin is provided "AS IS" without warranty of any kind. In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.

<< Previous INDEX Search src Set bookmark Go to bookmark Next >>



Партнёры:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
Хостинг:

Закладки на сайте
Проследить за страницей
Created 1996-2025 by Maxim Chirkov
Добавить, Поддержать, Вебмастеру