Vulnerability Description
Exim before 4.95 has a heap-based buffer overflow for the alias list in host_name_lookup in host.c when sender_host_name is set.
CVSS Score
9.8
CRITICAL
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Exim | Exim | < 4.95 |
| Debian | Debian Linux | 10.0 |
Related Weaknesses (CWE)
References
- https://github.com/Exim/exim/commit/d4bc023436e4cce7c23c5f8bb5199e178b4cc743PatchThird Party Advisory
- https://github.com/Exim/exim/compare/exim-4.94...exim-4.95PatchRelease NotesThird Party Advisory
- https://github.com/Exim/exim/wiki/EximSecurityRelease NotesThird Party Advisory
- https://github.com/ivd38/exim_overflowExploitPatchThird Party Advisory
- https://lists.debian.org/debian-lts-announce/2022/08/msg00014.htmlMailing ListThird Party Advisory
- https://www.exim.org/static/doc/security/Vendor Advisory
- https://www.openwall.com/lists/oss-security/2022/08/06/8Mailing ListThird Party Advisory
- https://github.com/Exim/exim/commit/d4bc023436e4cce7c23c5f8bb5199e178b4cc743PatchThird Party Advisory
- https://github.com/Exim/exim/compare/exim-4.94...exim-4.95PatchRelease NotesThird Party Advisory
- https://github.com/Exim/exim/wiki/EximSecurityRelease NotesThird Party Advisory
- https://github.com/ivd38/exim_overflowExploitPatchThird Party Advisory
- https://lists.debian.org/debian-lts-announce/2022/08/msg00014.htmlMailing ListThird Party Advisory
- https://www.exim.org/static/doc/security/Vendor Advisory
- https://www.openwall.com/lists/oss-security/2022/08/06/8Mailing ListThird Party Advisory
FAQ
What is CVE-2022-37452?
CVE-2022-37452 is a vulnerability with a CVSS score of 9.8 (CRITICAL). Exim before 4.95 has a heap-based buffer overflow for the alias list in host_name_lookup in host.c when sender_host_name is set.
How severe is CVE-2022-37452?
CVE-2022-37452 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2022-37452?
Check the references section above for vendor advisories and patch information. Affected products include: Exim Exim, Debian Debian Linux.