cvs commit: ports/security/vuxml vuln.xml
eikemeier at fillmore-labs.com
Thu May 6 10:07:20 PDT 2004
Jacques A. Vidrine wrote:
> On Thu, May 06, 2004 at 06:19:22PM +0200, Oliver Eikemeier wrote:
>>Jacques A. Vidrine wrote:
>>>On Thu, May 06, 2004 at 08:43:53AM -0700, Oliver Eikemeier wrote:
>>>>eik 2004/05/06 08:43:53 PDT
>>>>FreeBSD ports repository
>>>> security/vuxml vuln.xml
>>>>exim buffer overflow when verify = header_syntax is used
>>>>Revision Changes Path
>>>>1.90 +27 -0 ports/security/vuxml/vuln.xml
>>>Actually, there are two bugs: CAN-2004-0399 CAN-2004-0400
>>>Were both of these fixed?
>>I guess I have no access to the preliminary information
>>CAN-2004-0399 contains, so I can't tell.
> George's advisory included two bugs:
> CAN-2004-0399: exim buffer overflows with sender address/host name
> when sender_verify is enabled
> CAN-2004-0400: exim buffer overflow with header name when
> headers_check_syntax is enabled
> Maybe only one of them affected the version of exim we have?
Neither do I know George. The advisory I refer to is
I verified that what is called `bug2' affects FreeBSD when
`verify = header_syntax' is used (which is not done in the default
configuration file), `bug1' is mentioned as effecting exim 3.35, which
is a stupid Debianism. Exim 3.36 is available since April 2002
in FreeBSD as mail/exim-old, is FORBIDDEN since September 2003 and
has been removed from the ports tree March 2004. `verify = header_syntax'
used to be `headers_check_syntax' in Exim 3.x, so obviously Georgi
Guninski and the George writing the CVE list entries are Debian users.
More information about the cvs-all