Language:
https://bugs.exim.org/show_bug.cgi?id=787
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=606612
https://lists.exim.org/lurker/message/20101207.215955.bb32d4f2.en.html
Severity: High
ID: 51179
File Name: exim_string_vformat.nasl
Version: 1.19
Type: remote
Family: SMTP problems
Published: 12/15/2010
Updated: 4/25/2023
Supported Sensors: Nessus
Risk Factor: High
Score: 8.4
Risk Factor: High
Base Score: 9.3
Temporal Score: 7.7
Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C
CVSS Score Source: CVE-2010-4344
Risk Factor: High
Base Score: 8.8
Temporal Score: 8.2
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C
CPE: cpe:/a:exim:exim
Exploit Available: true
Exploit Ease: Exploits are available
Exploited by Nessus: true
Patch Publication Date: 12/8/2008
Vulnerability Publication Date: 12/10/2010
CISA Known Exploited Vulnerability Due Dates: 4/15/2022
CANVAS (CANVAS)
Core Impact
Metasploit (Exim4 string_format Function Heap Buffer Overflow)
CVE: CVE-2010-4344
BID: 45308