CVE-2012-5671 Information

Share on:

Description

Heap-based buffer overflow in the dkim_exim_query_dns_txt function in dkim.c in Exim 4.70 through 4.80 when DKIM support is enabled and acl_smtp_connect and acl_smtp_rcpt are not set to \warn control = dkim_disable_verify\ allows remote attackers to execute arbitrary code via an email from a malicious DNS server.

Reference

http://lists.fedoraproject.org/pipermail/package-announce/2012-November/091664.html http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090900.html http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090963.html http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00018.html http://osvdb.org/86616 http://secunia.com/advisories/51098 http://secunia.com/advisories/51115 http://secunia.com/advisories/51153 http://secunia.com/advisories/51155 http://www.debian.org/security/2012/dsa-2566 http://www.openwall.com/lists/oss-security/2012/10/26/5 http://www.securityfocus.com/bid/56285 http://www.ubuntu.com/usn/USN-1618-1 https://exchange.xforce.ibmcloud.com/vulnerabilities/79615 https://lists.exim.org/lurker/message/20121026.080330.74b9147b.en.html