Exim host_aton Command Line Overflow

2005-01-06T08:11:29
ID OSVDB:12726
Type osvdb
Reporter iDEFENSE(idlabs-advisories@idefense.com)
Modified 2005-01-06T08:11:29

Description

Vulnerability Description

A remote overflow exists in Exim. Exim fails to properly check input to host_aton() resulting in a buffer overflow. With a specially crafted request of an IPv6 address with more than 8 components, an attacker can cause execution of arbitrary code resulting in a loss of integrity.

Solution Description

Currently, there are no known workarounds or upgrades to correct this issue. However, Exim has released a patch to address this vulnerability.

Short Description

A remote overflow exists in Exim. Exim fails to properly check input to host_aton() resulting in a buffer overflow. With a specially crafted request of an IPv6 address with more than 8 components, an attacker can cause execution of arbitrary code resulting in a loss of integrity.

References:

Vendor URL: http://www.exim.org Vendor Specific Advisory URL Security Tracker: 1012771 Secunia Advisory ID:13713 Secunia Advisory ID:13817 Secunia Advisory ID:13823 Secunia Advisory ID:13853 Related OSVDB ID: 12727 Other Advisory URL: http://www.debian.org/security/2005/dsa-637 Other Advisory URL: http://www.idefense.com/application/poi/display?id=178&type=vulnerabilities Other Advisory URL: http://www.exim.org/mail-archives/exim-announce/2005/msg00000.html Other Advisory URL: http://security.gentoo.org/glsa/glsa-200501-23.xml Nessus Plugin ID:16111 CVE-2005-0021