7.5
CVSSv2

CVE-2018-6789

Published: 08/02/2018 Updated: 03/06/2021
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 762
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

An issue exists in the base64d function in the SMTP listener in Exim prior to 4.90.1. By sending a handcrafted message, a buffer overflow may happen. This can be used to execute code remotely.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

exim exim

debian debian linux 7.0

debian debian linux 8.0

debian debian linux 9.0

canonical ubuntu linux 14.04

canonical ubuntu linux 17.10

canonical ubuntu linux 16.04

Vendor Advisories

Debian Bug report logs - #890000 exim4: CVE-2018-6789: Buffer overflow in an utility function Package: src:exim4; Maintainer for src:exim4 is Exim4 Maintainers <pkg-exim4-maintainers@listsaliothdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Fri, 9 Feb 2018 21:03:05 UTC Severity: grave Tag ...
Exim could be made to crash or run programs if it received specially crafted network traffic ...
Meh Chang discovered a buffer overflow flaw in a utility function used in the SMTP listener of Exim, a mail transport agent A remote attacker can take advantage of this flaw to cause a denial of service, or potentially the execution of arbitrary code via a specially crafted message For the oldstable distribution (jessie), this problem has been fi ...
Buffer overflow in b64decode() function, possibly leading to remote code execution:An issue was discovered in the base64d function in the SMTP listener in Exim before 4901 By sending a handcrafted message, a buffer overflow may happen This can be used to execute code remotely (CVE-2018-6789) ...
An issue was discovered in the base64d function in the SMTP listener in Exim before 4901 By sending a handcrafted message, a buffer overflow may happen This can be used to execute code remotely ...
An issue was discovered in the base64d function in the SMTP listener in Exim before 4901 By sending a handcrafted message, a buffer overflow may happen This can be used to execute code remotely ...

Exploits

#!/usr/bin/python import time import socket import struct s = None f = None def logo(): print print " CVE-2018-6789 Poc Exploit" print "@straight_blast ; straightblast426@gmailcom" print def connect(host, port): global s global f s = socketcreate_connection((host,port)) f = smakefile('rw', bufsize=0) def p(v): r ...
# Exploit Title: exim 490 - Remote Code Execution # Date: 2018-10-24 # Exploit Author: hackkgr # Vendor Homepage: eximorg # Version: exim < 490 # Tested on: debian exim 489, ubuntu exim 486_2 # CVE : CVE-2018-6789 #!/usr/bin/python #debian exim 489 #ubuntu exim 486_2 import time import socket import struct import os import ospath impor ...
Exim versions prior to 4901 remote buffer overflow proof of concept exploit ...
Exim version 490 remote code execution exploit ...
Exim versions prior to 4901 suffer from a base64d remote code execution vulnerability ...

Github Repositories

PoC materials to exploit CVE-2018-6789

Exim CVE-2018-6789 PoC materials to exploit CVE-2018-6789 Blogpost explaining the PoC is available on Synacktiv Blog This PoC connects to a vulnerable Exim server and exploits CVE-2018-6789 Usage usage: exploit [-hv] <host> <port> <acl_pointer> options: -h, --help Print this help -v, --verbose Enable verbose outpu

CVE-2018-6789 环境搭建 安装依赖 apt-get install gcc net-tools vim gdb python wget git make procps libpcre3-dev libdb-dev libxt-dev libxaw7-dev 下载旧版本的exim wget ftp://mirroreasynameat/exim-ftp/exim/exim4/old/exim-489targz tar -xvzf /exim-489targz cd /exim-489 cp src/EDITME Local/Makefile cp exim_monitor/EDITME

This is source code for ++Towards Automatic and Precise Heap Layout Manipulation for General-Purpose Programs++ Introduction BAGUA aims to extract heap layout primitives from target programs, and achieve automatic heap manipulation by assembling the primitives Here we open the implementation of our core insight, which includes primitive capability modeling, ILP modeling, dea

Exim < 4.90.1 RCE Vulnerability remake for Python3 with arguments passed from CLI

CVE-2018-6789 Exim &lt; 4901 RCE Vulnerability Exim &lt; 4901 RCE Vulnerability remake for Python3 with arguments passed from CLI Usage: python3 eximpy -t localhost -p 25 -lh 1921680159 -lp 1337

This repository provides a learning environment to understand how an Exim RCE exploit for CVE-2018-6789 works.

Exim RCE (CVE-2018-6789) Learning Environment Description This is a set of files, scripts, notes, to set up an environment to investigate the Exim RCE (CVE-2018-6789) It can be used to debug Exim, write exploits, trace Exim function calls, learn about Exim's custom memory management (storeblocks), find out how a real-world exploit works, It should only be used for

Recent Articles

Buffer overflow in Unix mailer Exim imperils 400,000 email servers
The Register • John Leyden • 07 Mar 2018

Bug already plugged, get updating

Researchers have uncovered a critical buffer overflow vulnerability in all versions of the Exim mail transfer agent. The flaw (CVE-2018-6789) leaves an estimated 400,000 email servers at potential risk to remote code execution-style attacks. Fortunately a patched version (Exim version 4.90.1) is already available. The bug might be exploited by unauthenticated users rather than hackers who have already broken into targeted systems or scored login credentials through some other (doubtless nefariou...