Exim < 4.44 Multiple Overflows

high Nessus Plugin ID 16111


The remote mail server is vulnerable to a buffer overflow attack.


The remote host is running Exim, a message transfer agent (SMTP).

It is reported that Exim is prone to an IPv6 Address and an SPA authentication buffer overflow. An attacker, exploiting this issue, may be able to execute arbitrary code on the remote host.

Exim must be configured with SPA Authentication or with IPv6 support to exploit those flaws.

In addition, Exim is vulnerable to two local overflows in command line option handling. However, Nessus has not tested for these.


Upgrade to Exim 4.44 or newer

Plugin Details

Severity: High

ID: 16111

File Name: exim_spa_ipv6_overflow.nasl

Version: 1.17

Type: remote

Published: 1/7/2005

Updated: 7/10/2018

Configuration: Enable paranoid mode

Supported Sensors: Nessus

Risk Information


Risk Factor: Medium

Score: 6.7


Risk Factor: High

Base Score: 7.6

Temporal Score: 6

Vector: CVSS2#AV:N/AC:H/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: cpe:/a:exim:exim

Required KB Items: Settings/ParanoidReport

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 1/12/2005

Vulnerability Publication Date: 1/6/2005

Reference Information

CVE: CVE-2005-0021, CVE-2005-0022

BID: 12185, 12188