Fedora Core 2 : exim-4.43-1.FC2.1 (2005-001)

High Nessus Plugin ID 16113


The remote Fedora Core host is missing a security update.


This erratum fixes two relatively minor security issues which were discovered in Exim in the last few weeks. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the names CVE-2005-0021 and CVE-2005-0022 to these, respectively.

1. The function host_aton() can overflow a buffer if it is presented with an illegal IPv6 address that has more than 8 components.

2. The second report described a buffer overflow in the function spa_base64_to_bits(), which is part of the code for SPA authentication. This code originated in the Samba project. The overflow can be exploited only if you are using SPA authentication.

Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.


Update the affected packages.

See Also


Plugin Details

Severity: High

ID: 16113

File Name: fedora_2005-001.nasl

Version: $Revision: 1.12 $

Type: local

Agent: unix

Published: 2005/01/07

Modified: 2015/10/21

Dependencies: 12634

Risk Information

Risk Factor: High


Base Score: 7.2

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:fedoraproject:fedora:exim, p-cpe:/a:fedoraproject:fedora:exim-debuginfo, p-cpe:/a:fedoraproject:fedora:exim-doc, p-cpe:/a:fedoraproject:fedora:exim-mon, p-cpe:/a:fedoraproject:fedora:exim-sa, cpe:/o:fedoraproject:fedora_core:2

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list

Patch Publication Date: 2005/01/06

Reference Information

CVE: CVE-2005-0021, CVE-2005-0022

FEDORA: 2005-001