Exim < 4.44 Multiple Overflows

This script is Copyright (C) 2005-2014 Tenable Network Security, Inc.


Synopsis :

The remote mail server is vulnerable to a buffer overflow attack.

Description :

The remote host is running Exim, a message transfer agent (SMTP).

It is reported that Exim is prone to an IPv6 Address and an SPA
authentication buffer overflow. An attacker, exploiting this issue,
may be able to execute arbitrary code on the remote host.

Exim must be configured with SPA Authentication or with IPv6 support
to exploit those flaws.

In addition, Exim is vulnerable to two local overflows in command line
option handling. However, Nessus has not tested for these.

Solution :

Upgrade to Exim 4.44 or newer

Risk factor :

High / CVSS Base Score : 7.6
(CVSS2#AV:N/AC:H/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 5.6
(CVSS2#E:U/RL:OF/RC:C)
Public Exploit Available : false

Family: SMTP problems

Nessus Plugin ID: 16111 (exim_spa_ipv6_overflow.nasl)

Bugtraq ID: 12185
12188

CVE ID: CVE-2005-0021
CVE-2005-0022