Lucene search

K
nessusThis script is Copyright (C) 2005-2018 Tenable Network Security, Inc.EXIM_SPA_IPV6_OVERFLOW.NASL
HistoryJan 07, 2005 - 12:00 a.m.

Exim < 4.44 Multiple Overflows

2005-01-0700:00:00
This script is Copyright (C) 2005-2018 Tenable Network Security, Inc.
www.tenable.com
12

The remote host is running Exim, a message transfer agent (SMTP).

It is reported that Exim is prone to an IPv6 Address and an SPA authentication buffer overflow. An attacker, exploiting this issue, may be able to execute arbitrary code on the remote host.

Exim must be configured with SPA Authentication or with IPv6 support to exploit those flaws.

In addition, Exim is vulnerable to two local overflows in command line option handling. However, Nessus has not tested for these.

#
# (C) Tenable Network Security, Inc.
#

include("compat.inc");

if (description)
{
 script_id(16111);
 script_version("1.17");
 script_cvs_date("Date: 2018/07/10 14:27:33");

 script_cve_id("CVE-2005-0021", "CVE-2005-0022");
 script_bugtraq_id(12185,12188);

 script_name(english:"Exim < 4.44 Multiple Overflows");
 script_summary(english:"Exim Illegal IPv6 Address and SPA Authentication Buffer Overflow Vulnerabilities");

 script_set_attribute(attribute:"synopsis", value:"The remote mail server is vulnerable to a buffer overflow attack.");
 script_set_attribute(attribute:"description", value:
"The remote host is running Exim, a message transfer agent (SMTP).

It is reported that Exim is prone to an IPv6 Address and an SPA
authentication buffer overflow. An attacker, exploiting this issue,
may be able to execute arbitrary code on the remote host.

Exim must be configured with SPA Authentication or with IPv6 support
to exploit those flaws.

In addition, Exim is vulnerable to two local overflows in command line
option handling. However, Nessus has not tested for these.");
 script_set_attribute(attribute:"solution", value:"Upgrade to Exim 4.44 or newer");
 script_set_cvss_base_vector("CVSS2#AV:N/AC:H/Au:N/C:C/I:C/A:C");
 script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
 script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
 script_set_attribute(attribute:"exploit_available", value:"true");

 script_set_attribute(attribute:"vuln_publication_date", value:"2005/01/06");
 script_set_attribute(attribute:"patch_publication_date", value:"2005/01/12");
 script_set_attribute(attribute:"plugin_publication_date", value:"2005/01/07");

 script_set_attribute(attribute:"potential_vulnerability", value:"true");
 script_set_attribute(attribute:"plugin_type", value:"remote");
 script_set_attribute(attribute:"cpe", value:"cpe:/a:exim:exim");
 script_end_attributes();

 script_category(ACT_GATHER_INFO);
 script_copyright(english:"This script is Copyright (C) 2005-2018 Tenable Network Security, Inc.");
 script_family(english:"SMTP problems");

 script_dependencie("smtpserver_detect.nasl");
 script_require_keys("Settings/ParanoidReport");
 script_require_ports("Services/smtp", 25);

 exit(0);
}

include("audit.inc");
include("global_settings.inc");
include("smtp_func.inc");

#
# RHEL 4, CentOS 4, and more ship wih a (patched) version of exim by default
#
if (report_paranoia < 2) audit(AUDIT_PARANOID);

port = get_kb_item("Services/smtp");
if(!port) port = 25;
if (! get_port_state(port)) exit(0);

banner = get_smtp_banner(port:port);
if(!banner)exit(0);
if ( "Exim" >!< banner  ) exit(0);

if(egrep(pattern:"220.*Exim ([0-3]\.|4\.([0-9][^0-9]|[0-3][0-9]|4[0-3][^0-9]))", string:banner))
        security_hole(port);

VendorProductVersionCPE
eximeximcpe:/a:exim:exim