Upstream information

CVE-2012-5671 at MITRE

Description

Heap-based buffer overflow in the dkim_exim_query_dns_txt function in dkim.c in Exim 4.70 through 4.80, when DKIM support is enabled and acl_smtp_connect and acl_smtp_rcpt are not set to "warn control = dkim_disable_verify," allows remote attackers to execute arbitrary code via an email from a malicious DNS server.

SUSE information

Overall state of this security issue: Postponed

This issue is currently rated as having important severity.

CVSS v2 Scores
  National Vulnerability Database
Base Score 6.8
Vector AV:N/AC:M/Au:N/C:P/I:P/A:P
Access Vector Network
Access Complexity Medium
Authentication None
Confidentiality Impact Partial
Integrity Impact Partial
Availability Impact Partial
SUSE Bugzilla entry: 786652 [RESOLVED / FIXED]

SUSE Security Advisories:

List of released packages

Product(s) Fixed package version(s) References
openSUSE 11.4
  • exim >= 4.80.1-23.1
  • exim-debuginfo >= 4.80.1-23.1
  • exim-debugsource >= 4.80.1-23.1
  • eximon >= 4.80.1-23.1
  • eximon-debuginfo >= 4.80.1-23.1
  • eximstats-html >= 4.80.1-23.1
Patchnames:
openSUSE-2012-738
openSUSE 13.1
  • exim >= 4.83-6.4.1
  • exim-debuginfo >= 4.83-6.4.1
  • exim-debugsource >= 4.83-6.4.1
  • eximon >= 4.83-6.4.1
  • eximon-debuginfo >= 4.83-6.4.1
  • eximstats-html >= 4.83-6.4.1
Patchnames:
openSUSE-2014-482
openSUSE Tumbleweed
  • exim >= 4.86.2-2.2
  • eximon >= 4.86.2-2.2
  • eximstats-html >= 4.86.2-2.2
Patchnames:
openSUSE Tumbleweed GA exim