⚠ Exploited in the wild
Exploitation observed in the wild. Not yet on CISA KEV.
CVE-2019-15846 — Classic Buffer Overflow in Exim
Severity
9.8CRITICALNVD
EPSS
64.0%
top 1.56%
CISA KEV
Not in KEV
Exploit
Exploited in wild
Active exploitation observed
Affected products
Timeline
PublishedSep 27
Latest updateMay 24
Description
Exim 4.92 through 4.92.2 allows remote code execution, a different vulnerability than CVE-2019-15846. There is a heap-based buffer overflow in string_vformat in string.c involving a long EHLO command.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9
Affected Packages1 packages
Also affects: Debian Linux 10.0, 8.0, 9.0, Fedora 29, 30, 31, Ubuntu Linux 19.04
Patches
🔴Vulnerability Details
7🔍Detection Rules
2📋Vendor Advisories
6🕵️Threat Intelligence
3💬Community
3Bugzilla▶
CVE-2019-15846 exim: out-of-bounds access in string_interpret_escape() leading to buffer overflow in the SMTP delivery process [fedora-all]↗2019-09-06
Bugzilla▶
CVE-2019-15846 exim: out-of-bounds access in string_interpret_escape() leading to buffer overflow in the SMTP delivery process [epel-all]↗2019-09-06
Bugzilla▶
CVE-2019-15846 exim: out-of-bounds access in string_interpret_escape() leading to buffer overflow in the SMTP delivery process↗2019-09-03