Description
Heap-based buffer overflow in the dkim_exim_query_dns_txt function in dkim.c in Exim 4.70 through 4.80, when DKIM support is enabled and acl_smtp_connect and acl_smtp_rcpt are not set to "warn control = dkim_disable_verify," allows remote attackers to execute arbitrary code via an email from a malicious DNS server.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-2566-1 | exim4 security update |
Ubuntu USN |
USN-1618-1 | Exim vulnerability |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-06T21:14:16.438Z
Reserved: 2012-10-24T00:00:00.000Z
Link: CVE-2012-5671
No data.
Status : Modified
Published: 2012-10-31T16:55:06.577
Modified: 2026-04-29T01:13:23.040
Link: CVE-2012-5671
OpenCVE Enrichment
No data.
Debian DSA
Ubuntu USN