CVE-2011-1764

HIGH

Description

Format string vulnerability in the dkim_exim_verify_finish function in src/dkim.c in Exim before 4.76 might allow remote attackers to execute arbitrary code or cause a denial of service (daemon crash) via format string specifiers in data used in DKIM logging, as demonstrated by an identity field containing a % (percent) character.

References

http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=624670

http://bugs.exim.org/show_bug.cgi?id=1106

http://git.exim.org/exim.git/commit/337e3505b0e6cd4309db6bf6062b33fa56e06cf8

http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00005.html

http://secunia.com/advisories/51155

http://www.debian.org/security/2011/dsa-2232

https://bugzilla.redhat.com/show_bug.cgi?id=702474

Details

Source: MITRE

Published: 2011-10-05

Updated: 2014-02-21

Type: CWE-134

Risk Information

CVSS v2.0

Base Score: 7.5

Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Impact Score: 6.4

Exploitability Score: 10

Severity: HIGH