Vulnerability Description
Stack-based buffer overflow in Exim 4 before 4.33, when the headers_check_syntax option is enabled, allows remote attackers to cause a denial of service and possibly execute arbitrary code during the header check.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| University Of Cambridge | Exim | <= 4.32 |
References
- http://lists.grok.org.uk/pipermail/full-disclosure/2004-May/021015.html
- http://www.debian.org/security/2004/dsa-501PatchVendor Advisory
- http://www.debian.org/security/2004/dsa-502PatchVendor Advisory
- http://www.guninski.com/exim1.htmlExploitPatchVendor Advisory
- https://exchange.xforce.ibmcloud.com/vulnerabilities/16077
- http://lists.grok.org.uk/pipermail/full-disclosure/2004-May/021015.html
- http://www.debian.org/security/2004/dsa-501PatchVendor Advisory
- http://www.debian.org/security/2004/dsa-502PatchVendor Advisory
- http://www.guninski.com/exim1.htmlExploitPatchVendor Advisory
- https://exchange.xforce.ibmcloud.com/vulnerabilities/16077
FAQ
What is CVE-2004-0400?
CVE-2004-0400 is a vulnerability with a CVSS score of 7.5 (HIGH). Stack-based buffer overflow in Exim 4 before 4.33, when the headers_check_syntax option is enabled, allows remote attackers to cause a denial of service and possibly execute arbitrary code during the ...
How severe is CVE-2004-0400?
CVE-2004-0400 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2004-0400?
Check the references section above for vendor advisories and patch information. Affected products include: University Of Cambridge Exim.