Unknown
CVE-2011-1764
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below:
Add References:
Unknown
(0 users assessed)Unknown
(0 users assessed)Unknown
Unknown
Unknown
MITRE ATT&CK
Collection
Command and Control
Credential Access
Defense Evasion
Discovery
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Topic Tags
Description
Format string vulnerability in the dkim_exim_verify_finish function in src/dkim.c in Exim before 4.76 might allow remote attackers to execute arbitrary code or cause a denial of service (daemon crash) via format string specifiers in data used in DKIM logging, as demonstrated by an identity field containing a % (percent) character.
Add Assessment
No one has assessed this topic. Be the first to add your voice to the community.
CVSS V3 Severity and Metrics
General Information
Vendors
- exim
Products
- exim,
- exim 2.10,
- exim 2.11,
- exim 2.12,
- exim 3.00,
- exim 3.01,
- exim 3.02,
- exim 3.03,
- exim 3.10,
- exim 3.11,
- exim 3.12,
- exim 3.13,
- exim 3.14,
- exim 3.15,
- exim 3.16,
- exim 3.20,
- exim 3.21,
- exim 3.22,
- exim 3.30,
- exim 3.31,
- exim 3.32,
- exim 3.33,
- exim 3.34,
- exim 3.35,
- exim 3.36,
- exim 4.00,
- exim 4.01,
- exim 4.02,
- exim 4.03,
- exim 4.04,
- exim 4.05,
- exim 4.10,
- exim 4.11,
- exim 4.12,
- exim 4.14,
- exim 4.20,
- exim 4.21,
- exim 4.22,
- exim 4.23,
- exim 4.24,
- exim 4.30,
- exim 4.31,
- exim 4.32,
- exim 4.33,
- exim 4.34,
- exim 4.40,
- exim 4.41,
- exim 4.42,
- exim 4.43,
- exim 4.44,
- exim 4.50,
- exim 4.51,
- exim 4.52,
- exim 4.53,
- exim 4.54,
- exim 4.60,
- exim 4.61,
- exim 4.62,
- exim 4.63,
- exim 4.64,
- exim 4.65,
- exim 4.66,
- exim 4.67,
- exim 4.68,
- exim 4.69,
- exim 4.70,
- exim 4.71,
- exim 4.72,
- exim 4.73,
- exim 4.74
References
Advisory
Additional Info
Technical Analysis
Report as Exploited in the Wild
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below: