Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2001-0690Use of Externally-Controlled Format String in OF Cambridge Exim

6 documents6 sources
Severity
7.5HIGHNVD
EPSS
20.2%
top 4.48%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Timeline
PublishedSep 20
Latest updateApr 30

Description

Format string vulnerability in exim (3.22-10 in Red Hat, 3.12 in Debian and 3.16 in Conectiva) in batched SMTP mode allows a remote attacker to execute arbitrary code via format strings in SMTP mail headers.

CVSS vector

AV:N/AC:L/C:P/I:P/A:PExploitability: 10.0 | Impact: 6.4

Affected Packages1 packages

Also affects: Debian Linux 4.0

Patches

🔴Vulnerability Details

2
GHSA
GHSA-wmjp-jcfp-7jf8: Format string vulnerability in exim (32022-04-30
VulnCheck
university_of_cambridge Exim Use of Externally-Controlled Format String2001

💥Exploits & PoCs

1
Exploit-DB
Exim 3.x - Format String2001-06-06

📋Vendor Advisories

1
Red Hat
security flaw2001-06-06

💬Community

1
Bugzilla
CVE-2001-0690 security flaw2018-08-16