Heap-based buffer overflow in the dkim_exim_query_dns_txt function in dkim.c in Exim 4.70 through 4.80, when DKIM support is enabled and acl_smtp_connect and acl_smtp_rcpt are not set to "warn control = dkim_disable_verify," allows remote attackers to execute arbitrary code via an email from a malicious DNS server.
https://lists.exim.org/lurker/message/20121026.080330.74b9147b.en.html
https://exchange.xforce.ibmcloud.com/vulnerabilities/79615
http://www.ubuntu.com/usn/USN-1618-1
http://www.securityfocus.com/bid/56285
http://www.openwall.com/lists/oss-security/2012/10/26/5
http://www.debian.org/security/2012/dsa-2566
http://secunia.com/advisories/51155
http://secunia.com/advisories/51153
http://secunia.com/advisories/51115
http://secunia.com/advisories/51098
http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00018.html
http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090963.html
http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090900.html
http://lists.fedoraproject.org/pipermail/package-announce/2012-November/091664.html