tidying
[exim.git] / doc / doc-txt / cve-2019-15846 / mitre.mbx
CommitLineData
c3aefacc
HSHR
1From cve-request@mitre.org Mon Sep 2 18:12:21 2019
2Return-Path: <cve-request@mitre.org>
3Authentication-Results: mx.net.schlittermann.de; iprev=pass
4 (smtpvbsrv1.mitre.org) smtp.remote-ip=198.49.146.234; spf=pass
5 smtp.mailfrom=mitre.org; dkim=pass header.d=mitre.org header.s=selector1
6 header.a=rsa-sha256; dmarc=pass header.from=mitre.org
7From: cve-request@mitre.org
8To: hs@schlittermann.de
9Cc: cve-request@mitre.org
10Subject: Re: [scr749683] one CVE
11Date: Mon, 2 Sep 2019 12:12:12 -0400 (EDT)
12MIME-Version: 1.0
13Content-Transfer-Encoding: 8bit
14Content-Type: text/plain; charset=utf-8
15Status: RO
16
17> [Suggested description]
18> The SMTP Delivery process in Exim 4.92.1 has a Buffer Overflow.
19> In the default runtime configuration, this is exploitable with crafted
20> Server Name Indication (SNI) data during a TLS negotiation. In other
21> configurations, it is exploitable with a crafted client TLS certificate.
22>
23> ------------------------------------------
24>
25> [Additional Information]
26> It's the first CVE I request, so if there is anything missing, please tell me
27>
28> ------------------------------------------
29>
30> [Vulnerability Type]
31> Buffer Overflow
32>
33> ------------------------------------------
34>
35> [Vendor of Product]
36> Exim Development Team
37>
38> ------------------------------------------
39>
40> [Affected Product Code Base]
41> Exim - 4.92.1
42>
43> ------------------------------------------
44>
45> [Affected Component]
46> SMTP Delivery process
47>
48> ------------------------------------------
49>
50> [Attack Type]
51> Remote
52>
53> ------------------------------------------
54>
55> [Impact Code execution]
56> true
57>
58> ------------------------------------------
59>
60> [Attack Vectors]
61> To exploit the vulnerability the attacker needs a crafted client TLS
62> certificate or a crafted SNI. While the first attack vector needs a
63> non-default runtime configuration, the latter one should work with the
64> default runtime config.
65>
66> ------------------------------------------
67>
68> [Discoverer]
69> zerons zerons <sironhide0null@gmail.com>
70>
71> ------------------------------------------
72>
73> [Reference]
74> http://exim.org/static/doc/security/CVE-2019-15846.txt
75
76Use CVE-2019-15846.
77
78
79--
80CVE Assignment Team
81M/S M300, 202 Burlington Road, Bedford, MA 01730 USA
82[ A PGP key is available for encrypted communications at
83 http://cve.mitre.org/cve/request_id.html ]
84