Buffer overflow in the spa_base64_to_bits function in Exim prior to 4.43, as originally obtained from Samba code, and as called by the auth_spa_client function, may allow malicious users to execute arbitrary code during SPA authentication.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
university of cambridge exim |
||
university of cambridge exim 4.41 |
||
university of cambridge exim 4.42 |