Exim < 4.76 dkim_exim_verify_finish() DKIM-Signature Header Format String

This script is Copyright (C) 2011-2015 Tenable Network Security, Inc.

Synopsis :

The remote mail server is potentially affected by a format string

Description :

Based on its response to a specially formatted mail message, the Exim
mail server listening on this port appears to be affected by a format
string vulnerability. The vulnerability is due to a failure in the
dkim_exim_verify_finish() function to properly sanitize format string
specifiers in the DKIM-Signature header. A remote attacker can exploit
this by sending a specially crafted email, resulting in the execution
of arbitrary code as the Exim run-time user.

See also :


Solution :

Upgrade to Exim 4.76 or later.

Risk factor :

High / CVSS Base Score : 7.5
CVSS Temporal Score : 6.5
Public Exploit Available : false

Family: SMTP problems

Nessus Plugin ID: 53856 ()

Bugtraq ID: 47736

CVE ID: CVE-2011-1407

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now