Family: Debian Local Security Checks --> Category: infos
[DSA502] DSA-502-1 exim-tls Vulnerability Scan
Vulnerability Scan Summary
Detailed Explanation for this Vulnerability Test
Georgi Guninski discovered two stack-based buffer overflows in exim
and exim-tls. They cannot be exploited with the default
configuration from the Debian system, though. The Common
Vulnerabilities and Exposures project identifies the following
problems that are fixed with this update:
When "sender_verify = true" is configured in exim.conf a buffer
overflow can happen during verification of the sender. This
problem is fixed in exim 4.
When headers_check_syntax is configured in exim.conf a buffer
overflow can happen during the header check. This problem does
also exist in exim 4.
For the stable distribution (woody) these problems have been fixed in
The unstable distribution (sid) does not contain exim-tls anymore.
The functionality has been incorporated in the main exim versions
which have these problems fixed in version 3.36-11 for exim 3 and in
version 4.33-1 for exim 4.
We recommend that you upgrade your exim-tls package.
Solution : http://www.debian.org/security/2004/dsa-502
Threat Level: High
Click HERE for more information and discussions on this network vulnerability scan.