summaryrefslogtreecommitdiff
path: root/test/stdout/0372
diff options
context:
space:
mode:
authorMagnus Holmgren <holmgren@lysator.liu.se>2007-05-14 18:56:25 +0000
committerMagnus Holmgren <holmgren@lysator.liu.se>2007-05-14 18:56:25 +0000
commit0806a9c5bfe809d616ae63fa68e959a2fac2a864 (patch)
treeccf3ad57110bf850a58633f06e5e136565943962 /test/stdout/0372
parent2e30fa9d9b2353551db96aef5c770460f92e1515 (diff)
The "spam" ACL condition code contained a sscanf() call with a %s
conversion specification without a maximum field width, thereby enabling a rogue spamd server to cause a buffer overflow. While nobody in their right mind would setup Exim to query an untrusted spamd server, an attacker that gains access to a server running spamd could potentially exploit this vulnerability to run arbitrary code as the Exim user.
Diffstat (limited to 'test/stdout/0372')
0 files changed, 0 insertions, 0 deletions