This script is Copyright (C) 2004-2013 Tenable Network Security, Inc.
The remote Debian host is missing a security-related update.
Georgi Guninski discovered two stack-based buffer overflows. They can
not be exploited with the default configuration from the Debian
system, though. The Common Vulnerabilities and Exposures project
identifies the following problems that are fixed with this update :
When 'sender_verify = true' is configured in exim.conf a
buffer overflow can happen during verification of the
sender. This problem is fixed in exim 4.
When headers_check_syntax is configured in exim.conf a
buffer overflow can happen during the header check. This
problem does also exist in exim 4.
See also :
Upgrade the exim package.
For the stable distribution (woody) these problems have been fixed in
Risk factor :
High / CVSS Base Score : 7.5
CVSS Temporal Score : 6.2
Public Exploit Available : true