Summary
The remote host is missing an update to exim-tls
announced via advisory DSA 502-1.
Solution
https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20502-1
Insight
Georgi Guninski discovered two stack-based buffer overflows in exim and exim-tls. They can not be exploited with the default configuration from the Debian system, though. The Common Vulnerabilities and Exposures project identifies the following problems that are fixed with this update:
CVE-2004-0399
When sender_verify = true is configured in exim.conf a buffer overflow can happen during verification of the sender. This problem is fixed in exim 4.
CVE-2004-0400
When headers_check_syntax is configured in exim.conf a buffer overflow can happen during the header check. This problem does also exist in exim 4.
For the stable distribution (woody) these problems have been fixed in version 3.35-3woody2.
The unstable distribution (sid) does not contain exim-tls anymore.
The functionality has been incorporated in the main exim versions which have these problems fixed in version 3.36-11 for exim 3 and in version 4.33-1 for exim 4.
We recommend that you upgrade your exim-tls package.
Severity
Classification
-
CVE CVE-2004-0399, CVE-2004-0400 -
CVSS Base Score: 7.5
AV:N/AC:L/Au:N/C:P/I:P/A:P
Related Vulnerabilities