1 From cve-request@mitre.org Mon Sep 2 18:12:21 2019
2 Return-Path: <cve-request@mitre.org>
3 Authentication-Results: mx.net.schlittermann.de; iprev=pass
4 (smtpvbsrv1.mitre.org) smtp.remote-ip=198.49.146.234; spf=pass
5 smtp.mailfrom=mitre.org; dkim=pass header.d=mitre.org header.s=selector1
6 header.a=rsa-sha256; dmarc=pass header.from=mitre.org
7 From: cve-request@mitre.org
8 To: hs@schlittermann.de
9 Cc: cve-request@mitre.org
10 Subject: Re: [scr749683] one CVE
11 Date: Mon, 2 Sep 2019 12:12:12 -0400 (EDT)
13 Content-Transfer-Encoding: 8bit
14 Content-Type: text/plain; charset=utf-8
17 > [Suggested description]
18 > The SMTP Delivery process in Exim 4.92.1 has a Buffer Overflow.
19 > In the default runtime configuration, this is exploitable with crafted
20 > Server Name Indication (SNI) data during a TLS negotiation. In other
21 > configurations, it is exploitable with a crafted client TLS certificate.
23 > ------------------------------------------
25 > [Additional Information]
26 > It's the first CVE I request, so if there is anything missing, please tell me
28 > ------------------------------------------
30 > [Vulnerability Type]
33 > ------------------------------------------
36 > Exim Development Team
38 > ------------------------------------------
40 > [Affected Product Code Base]
43 > ------------------------------------------
45 > [Affected Component]
46 > SMTP Delivery process
48 > ------------------------------------------
53 > ------------------------------------------
55 > [Impact Code execution]
58 > ------------------------------------------
61 > To exploit the vulnerability the attacker needs a crafted client TLS
62 > certificate or a crafted SNI. While the first attack vector needs a
63 > non-default runtime configuration, the latter one should work with the
64 > default runtime config.
66 > ------------------------------------------
69 > zerons zerons <sironhide0null@gmail.com>
71 > ------------------------------------------
74 > http://exim.org/static/doc/security/CVE-2019-15846.txt
81 M/S M300, 202 Burlington Road, Bedford, MA 01730 USA
82 [ A PGP key is available for encrypted communications at
83 http://cve.mitre.org/cve/request_id.html ]