Exim through 4.93 has an out-of-bounds read in the SPA authenticator that could result in SPA/NTLM authentication bypass in auths/spa.c and auths/auth-spa.c.
The product reads data past the end, or before the beginning, of the intended buffer.
Link | Tags |
---|---|
https://bugs.exim.org/show_bug.cgi?id=2571 | third party advisory |
https://git.exim.org/exim.git/commit/57aa14b216432be381b6295c312065b2fd034f86 | third party advisory patch |
https://git.exim.org/exim.git/commit/a04174dc2a84ae1008c23b6a7109e7fa3fb7b8b0 | third party advisory patch |
https://www.debian.org/security/2020/dsa-4687 | third party advisory vendor advisory |
https://lists.debian.org/debian-lts-announce/2020/05/msg00017.html | third party advisory mailing list |
https://usn.ubuntu.com/4366-1/ | third party advisory vendor advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F6IQQ2SERFUD4WMRSX6XYDNK7Q4GPT7Y/ | vendor advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M7Z5UG6ZIG32V7M4PP3BCC65C27EWK7G/ | vendor advisory |
http://www.openwall.com/lists/oss-security/2021/05/04/7 | mailing list exploit third party advisory |