6.8
CVSSv2

CVE-2012-5671

Published: 31/10/2012 Updated: 29/08/2017
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
VMScore: 605
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

Heap-based buffer overflow in the dkim_exim_query_dns_txt function in dkim.c in Exim 4.70 up to and including 4.80, when DKIM support is enabled and acl_smtp_connect and acl_smtp_rcpt are not set to "warn control = dkim_disable_verify," allows remote malicious users to execute arbitrary code via an email from a malicious DNS server.

Vulnerable Product Search on Vulmon Subscribe to Product

exim exim 4.76

exim exim 4.77

exim exim 4.72

exim exim 4.73

exim exim 4.74

exim exim 4.75

exim exim 4.70

exim exim 4.71

exim exim 4.80

Vendor Advisories

Exim could be made to run programs if it received specially crafted network traffic ...
It was discovered that Exim, a mail transport agent, is not properly handling the decoding of DNS records for DKIM Specifically, crafted records can yield to a heap-based buffer overflow An attacker can exploit this flaw to execute arbitrary code For the stable distribution (squeeze), this problem has been fixed in version 472-6+squeeze3 For t ...