668
VMScore

CVE-2019-16928

Published: 27/09/2019 Updated: 07/11/2023
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Exim 4.92 up to and including 4.92.2 allows remote code execution, a different vulnerability than CVE-2019-15846. There is a heap-based buffer overflow in string_vformat in string.c involving a long EHLO command.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

exim exim

canonical ubuntu linux 19.04

debian debian linux 10.0

fedoraproject fedora 29

fedoraproject fedora 30

fedoraproject fedora 31

Vendor Advisories

Exim could be made to crash or run programs if it received specially crafted network traffic ...
A buffer overflow flaw was discovered in Exim, a mail transport agent A remote attacker can take advantage of this flaw to cause a denial of service, or potentially the execution of arbitrary code For the stable distribution (buster), this problem has been fixed in version 492-8+deb10u3 We recommend that you upgrade your exim4 packages For the ...
Exim 492 through 4922 allows remote code execution, a different vulnerability than CVE-2019-15846 There is a heap-based buffer overflow in string_vformat in stringc involving a long EHLO command(CVE-2019-16928) ...
Impact: Critical Public Date: 2019-09-27 CWE: CWE-119->CWE-787 Bugzilla: 1756930: CVE-2019-16928 exi ...
It has been discovered that Exim before 4923 is vulnerable to a heap-based buffer overflow in string_vformat (stringc) involving a long EHLO command leading to remote code execution ...

Mailing Lists

<!--X-Body-Begin--> <!--X-User-Header--> oss-sec mailing list archives <!--X-User-Header-End--> <!--X-TopPNI--> By Date By Thread </form> <!--X-TopPNI-End--> <!--X-MsgBody--> <!--X-Subject-Header-Begin--> Re: Exim CVE-2019-16928 RCE using a heap-based buffer overflow <!--X-Subject-Header-End--> <!--X-Head-of-Message--> From: He ...
<!--X-Body-Begin--> <!--X-User-Header--> oss-sec mailing list archives <!--X-User-Header-End--> <!--X-TopPNI--> By Date By Thread </form> <!--X-TopPNI-End--> <!--X-MsgBody--> <!--X-Subject-Header-Begin--> Re: Exim CVE-2019-16928 RCE using a heap-based buffer overflow <!--X-Subject-Header-End--> <!--X-Head-of-Message--> From: He ...

Github Repositories

Data Collection Related to Exim CVE-2019-10149

Exim CVE Data Collection Data Collection Related to Exim Vulnerabilities CVE-2019-10149, CVE-2019-15846, CVE-2019-16928 CVE Announcement: cvemitreorg/cgi-bin/cvenamecgi?name=CVE-2019-10149 Exploit Details: wwwexploit-dbcom/exploits/46974 Issue Timeline: seclistsorg/fulldisclosure/2019/Jun/16 NSA Advisory: mediadefensegov/2020/May/28/2002

Recent Articles

Stop us if you've heard this one before: Yet another critical flaw threatens Exim servers
The Register • Shaun Nichols in San Francisco • 30 Sep 2019

Remote code flaw sparks calls for major updates Exim marks the spot… of remote code execution: Patch due out today for 'give me root' flaw in mail server

Admins of Linux and Unix boxes running Exim would be well-advised to update the software following the disclosure of another critical security flaw. The Exim 4.92.3 patch, released on September 28th, includes a fix to close up the CVE-2019-16928 flaw. Discovered by bug-hunters with the QAX A-Team, the vulnerability is caused by a buffer overflow error that occurs when Exim processes an extremely long string in an Extended HELO (EHLO) Extended Simple Mail Transfer Protocol (ESMTP) command message...