9.8
CVSSv3

CVE-2020-28018

Published: 06/05/2021 Updated: 26/05/2021
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Exim 4 prior to 4.94.2 allows Use After Free in smtp_reset in certain situations that may be common for builds with OpenSSL.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

exim exim

Vendor Advisories

Prior versions of Exim 4 have Improper Neutralization of Line Delimiters Local users can alter the behavior of root processes because a recipient address can have a newline character (<a href="nvdnistgov/vuln/detail/CVE%2D2020-28015">CVE-2020-28015</a>) Prior versions of Exim 4 allowed Integer Overflow to Buffer Overflow in ...
A use-after-free in tls-opensslc has been found in Exim before version 4942 ...

Mailing Lists

Greetings OSS-Security! I took a look at that flaw toobut I wonder if there is a good technique to groom the heap to get that allocation right before the objective data There are some limits on using a MAIL cmd, first u cannot use it if another MAIL cmd was successful Second it calls smtp_reset() after finished The only way 'd be using RSE ...
Hi, On Tue, May 11, 2021 at 01:23:43PM +0200, null p0int3r wrote: Yes! After the second STARTTLS we send an invalid MAIL FROM command (for example, "MAIL FROM:(\"${run{}}\")\n") Exim then responds with a 501 error message that includes our "${run{}}" string, and since corked in tls_write() is still non-NULL, this string is written to wher ...
Hi, On Tue, May 11, 2021 at 11:18:12PM +0200, null p0int3r wrote: One of the name=value parameters for MAIL FROM is special, because it can allocate arbitrary (binary) characters (hint: we also used it to exploit another vulnerability in the advisory)! With best regards, -- the Qualys Security Advisory team [d1dejaj6dcqv24cloudfront ...
Dear Exim-Users Abstract -------- Several exploitable vulnerabilities in Exim were reported to us and are fixed We have prepared a security release, tagged as "exim-4942" This release contains all changes on the exim-494+fixes branch plus security fixes You should update your Exim instances as soon as possible (See below for short upgra ...
Hi again! Thanks for the reply In addition to my previous question, to leave it more clear I successfully exploited the Use-After-Free to get Heap Address Leak and the arbitrary read primitive mentioned in the advisory Talking about the arbitrary read, I sent a "MAIL FROM" command after the last "STARTTLS" When sending it after the START ...
Hi, I have a question to the Qualys researchers that discovered and successfully achieved RCE on CVE-2020-28018 (Use-After-Free vulnerability on tls-opensslc) This question is nor avisory related nor vulnerability discovery but about exploitation, so I am not sure if it is on the scope of this mailing list I am developing a Proof-of-Concept e ...
Hi, On Wed, May 12, 2021 at 02:46:31PM +0000, harrisjohnsonx wrote: We first send a large EHLO command to make sure that the next allocation will overwrite the freed struct gstring, and then we send the MAIL FROM command (with an AUTH parameter) to actually overwrite the freed struct gstring (with arbitrary characters) Hopefully this helps! ...
Qualys Security Advisory 21Nails: Multiple vulnerabilities in Exim ======================================================================== Contents ======================================================================== Summary Local vulnerabilities - CVE-2020-28007: Link attack in Exim's log directory - CVE-2020-28008: Assorted attacks in Ex ...
Hi, Replying as a list moderator: On Tue, May 11, 2021 at 01:23:43PM +0200, null p0int3r wrote: Yes, this is in scope So if anyone (not only the Qualys researchers) wants to reply for real, please feel free Alexander ...

Github Repositories

PoC exploits for software vulnerabilities

CVE Exploit PoC's PoC exploits for multiple software vulnerabilities Current exploits CVE-2019-18634 (LPE): Stack-based buffer overflow in sudo tgetpassc when pwfeedback module is enabled CVE-2021-3156 (LPE): Heap-based buffer overflow in sudo sudoersc when an argv ends with backslash character CVE-2020-28018 (RCE): Exim Use-After-Free (UAF) in tls-opensslc leading t

Speech slides

Slides Speech slides Current slides Exploiting sudo CVE-2021-3156: From heap-based overflow to LPE/EoP (Feb 19, 2021) CVE-2020-28018: From Use-After-Free to Remote Code Execution (Jun 18, 2021) Confronting CFI: Control-flow Hijacking in the Intel CET era for memory corruption exploit development (May 12, 2022)