Bug 1152507 (CVE-2019-16928) - VUL-0: CVE-2019-16928: exim: remotely triggerable buffer overflow in string_vformat()
Summary: VUL-0: CVE-2019-16928: exim: remotely triggerable buffer overflow in string_v...
Status: RESOLVED FIXED
Alias: CVE-2019-16928
Product: openSUSE Tumbleweed
Classification: openSUSE
Component: Basesystem (show other bugs)
Version: Current
Hardware: Other Other
: P3 - Medium : Major (vote)
Target Milestone: Current
Assignee: Forgotten User 4yKfwBnymp
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/243481/
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2019-09-30 11:53 UTC by Alexander Bergmann
Modified: 2019-10-10 12:18 UTC (History)
2 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Alexander Bergmann 2019-09-30 11:53:37 UTC
rh#1756930

A heap-based buffer overflow flaw was reported in the Exim's internal function string_vformat().  Additionally, it was identified that the overflow can be triggered via specially crafted SMTP protocol EHLO message, which may lead to unauthenticated remote code execution.

Upstream bug report:
https://bugs.exim.org/show_bug.cgi?id=2449

Upstream commit:
https://git.exim.org/exim.git/commitdiff/478effbfd9c3cc5a627fc671d4bf94d13670d65f

The issue was fixed upstream in version 4.92.3.

References:
https://bugzilla.redhat.com/show_bug.cgi?id=1756930
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-16928
http://seclists.org/oss-sec/2019/q3/253
http://www.debian.org/security/-1/dsa-4536
http://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-16928.html
https://git.exim.org/exim.git/patch/478effbfd9c3cc5a627fc671d4bf94d13670d65f
https://bugs.exim.org/show_bug.cgi?id=2449
Comment 1 Alexandros Toptsoglou 2019-10-10 12:18:22 UTC
Affects only Factory which has been updated to 4.92.3.