The "spam" ACL condition code contained a sscanf() call with a %s
authorMagnus Holmgren <holmgren@lysator.liu.se>
Mon, 14 May 2007 18:56:25 +0000 (18:56 +0000)
committerMagnus Holmgren <holmgren@lysator.liu.se>
Mon, 14 May 2007 18:56:25 +0000 (18:56 +0000)
conversion specification without a maximum field width, thereby
enabling a rogue spamd server to cause a buffer overflow. While nobody
in their right mind would setup Exim to query an untrusted spamd
server, an attacker that gains access to a server running spamd could
potentially exploit this vulnerability to run arbitrary code as the
Exim user.


No differences found