diff options
author | Magnus Holmgren <holmgren@lysator.liu.se> | 2007-05-14 18:56:25 +0000 |
---|---|---|
committer | Magnus Holmgren <holmgren@lysator.liu.se> | 2007-05-14 18:56:25 +0000 |
commit | 0806a9c5bfe809d616ae63fa68e959a2fac2a864 (patch) | |
tree | ccf3ad57110bf850a58633f06e5e136565943962 /test/stdout/2016 | |
parent | 2e30fa9d9b2353551db96aef5c770460f92e1515 (diff) |
The "spam" ACL condition code contained a sscanf() call with a %s
conversion specification without a maximum field width, thereby
enabling a rogue spamd server to cause a buffer overflow. While nobody
in their right mind would setup Exim to query an untrusted spamd
server, an attacker that gains access to a server running spamd could
potentially exploit this vulnerability to run arbitrary code as the
Exim user.
Diffstat (limited to 'test/stdout/2016')
0 files changed, 0 insertions, 0 deletions