CVE-2010-4344 vulnerability in Exim and Other Products
Published on December 14, 2010




Known Exploited Vulnerability
This Exim Heap-Based Buffer Overflow Vulnerability is part of CISA's list of Known Exploited Vulnerabilities. Heap-based buffer overflow in the string_vformat function in string.c in Exim before 4.70 allows remote attackers to execute arbitrary code via an SMTP session.
The following remediation steps are recommended / required by April 15, 2022: Apply updates per vendor instructions.
Vulnerability Analysis
CVE-2010-4344 is exploitable with network access, and does not require authorization privileges or user interaction. This vulnerability is considered to have a low attack complexity. It has the highest possible exploitability rating (3.9). The potential impact of an exploit of this vulnerability is considered to be critical as this vulnerability has a high impact to the confidentiality, integrity and availability of this component.
What is a Memory Corruption Vulnerability?
The software writes data past the end, or before the beginning, of the intended buffer. Typically, this can result in corruption of data, a crash, or code execution. The software may modify an index or perform pointer arithmetic that references a memory location that is outside of the boundaries of the buffer. A subsequent write operation then produces undefined or unexpected results.
CVE-2010-4344 has been classified to as a Memory Corruption vulnerability or weakness.
Products Associated with CVE-2010-4344
You can be notified by stack.watch whenever vulnerabilities like CVE-2010-4344 are published in these products:
What versions are vulnerable to CVE-2010-4344?
-
Exim Fixed in Version 4.70
-
OpenSuse Version 11.1
-
OpenSuse Version 11.2
-
OpenSuse Version 11.3
-
Debian Linux Version 5.0
-
Canonical Ubuntu Linux Version 9.10
-
Canonical Ubuntu Linux Version 8.04
-
Canonical Ubuntu Linux Version 6.06