Bugzilla will be upgraded to version 5.0 on a still to be determined date in the near future. The original upgrade date has been delayed.
Bug 44077 - local printf format attack in exim-3.22-10
local printf format attack in exim-3.22-10
Product: Red Hat Powertools
Classification: Retired
Component: exim (Show other bugs)
i386 Linux
medium Severity medium
: ---
: ---
Assigned To: Tim Waugh
: Security
Depends On:
  Show dependency treegraph
Reported: 2001-06-10 21:19 EDT by Need Real Name
Modified: 2008-05-01 11:38 EDT (History)
0 users

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Last Closed: 2001-06-11 10:46:13 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---

Attachments (Terms of Use)

External Trackers
Tracker ID Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2001:078 high SHIPPED_LIVE : Format string bug fixed in exim 2001-06-11 00:00:00 EDT

  None (edit)
Description Need Real Name 2001-06-10 21:19:41 EDT
The exim-3.22-10

has the same format string problem 
as one found in Debian	(which has exim-3.12)

The relevant part of Debian patch seems is
--- exim-3.12.orig/src/accept.c
+++ exim-3.12/src/accept.c
@@ -2449,7 +2449,7 @@
   nothing on success. The function moan_smtp_batch() does not return -
   it exits from the program with a non-zero return code. */
-  else if (smtp_reply != NULL) moan_smtp_batch(NULL, smtp_reply);
+  else if (smtp_reply != NULL) moan_smtp_batch(NULL, "%s", smtp_reply);
 /* Reset headers so that logging of rejects for a subsequent message
--- exim-3.12.orig/src/configure.default
Comment 1 Tim Waugh 2001-06-11 04:14:52 EDT
Thanks, I saw this.
Comment 2 Tim Waugh 2001-06-11 10:46:09 EDT
The maintainer has indicated that this vulnerability is local only, and is not 
triggered by SMTP with external sites.
Comment 3 Tim Waugh 2001-06-26 08:16:05 EDT
This is fixed in exim-3.22-14.

Note You need to log in before you can comment on or make changes to this bug.