7.5 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
0.422 Medium
EPSS
Percentile
97.3%
Georgi Guninski discovered two stack-based buffer overflows. They can not be exploited with the default configuration from the Debian system, though. The Common Vulnerabilities and Exposures project identifies the following problems that are fixed with this update :
CAN-2004-0399 When ‘sender_verify = true’ is configured in exim.conf a buffer overflow can happen during verification of the sender. This problem is fixed in exim 4.
CAN-2004-0400
When headers_check_syntax is configured in exim.conf a buffer overflow can happen during the header check. This problem does also exist in exim 4.
#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were
# extracted from Debian Security Advisory DSA-501. The text
# itself is copyright (C) Software in the Public Interest, Inc.
#
include('deprecated_nasl_level.inc');
include('compat.inc');
if (description)
{
script_id(15338);
script_version("1.24");
script_set_attribute(attribute:"plugin_modification_date", value:"2021/01/04");
script_cve_id("CVE-2004-0399", "CVE-2004-0400");
script_bugtraq_id(10290, 10291);
script_xref(name:"DSA", value:"501");
script_name(english:"Debian DSA-501-1 : exim - buffer overflow");
script_summary(english:"Checks dpkg output for the updated package");
script_set_attribute(
attribute:"synopsis",
value:"The remote Debian host is missing a security-related update."
);
script_set_attribute(
attribute:"description",
value:
"Georgi Guninski discovered two stack-based buffer overflows. They can
not be exploited with the default configuration from the Debian
system, though. The Common Vulnerabilities and Exposures project
identifies the following problems that are fixed with this update :
- CAN-2004-0399
When 'sender_verify = true' is configured in exim.conf a
buffer overflow can happen during verification of the
sender. This problem is fixed in exim 4.
- CAN-2004-0400
When headers_check_syntax is configured in exim.conf a
buffer overflow can happen during the header check. This
problem does also exist in exim 4."
);
script_set_attribute(
attribute:"see_also",
value:"http://www.debian.org/security/2004/dsa-501"
);
script_set_attribute(
attribute:"solution",
value:
"Upgrade the exim package.
For the stable distribution (woody) these problems have been fixed in
version 3.35-1woody3."
);
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
script_set_attribute(attribute:"exploit_available", value:"true");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:exim");
script_set_attribute(attribute:"cpe", value:"cpe:/o:debian:debian_linux:3.0");
script_set_attribute(attribute:"patch_publication_date", value:"2004/05/07");
script_set_attribute(attribute:"plugin_publication_date", value:"2004/09/29");
script_set_attribute(attribute:"vuln_publication_date", value:"2004/05/06");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_copyright(english:"This script is Copyright (C) 2004-2021 Tenable Network Security, Inc.");
script_family(english:"Debian Local Security Checks");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/local_checks_enabled", "Host/Debian/release", "Host/Debian/dpkg-l");
exit(0);
}
include("audit.inc");
include("debian_package.inc");
if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
if (!get_kb_item("Host/Debian/release")) audit(AUDIT_OS_NOT, "Debian");
if (!get_kb_item("Host/Debian/dpkg-l")) audit(AUDIT_PACKAGE_LIST_MISSING);
flag = 0;
if (deb_check(release:"3.0", prefix:"exim", reference:"3.35-1woody3")) flag++;
if (deb_check(release:"3.0", prefix:"eximon", reference:"3.35-1woody3")) flag++;
if (flag)
{
if (report_verbosity > 0) security_hole(port:0, extra:deb_report_get());
else security_hole(0);
exit(0);
}
else audit(AUDIT_HOST_NOT, "affected");
Vendor | Product | Version | CPE |
---|---|---|---|
debian | debian_linux | exim | p-cpe:/a:debian:debian_linux:exim |
debian | debian_linux | 3.0 | cpe:/o:debian:debian_linux:3.0 |