CVE-2020-28019

Source
https://nvd.nist.gov/vuln/detail/CVE-2020-28019
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2020-28019.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2020-28019
Downstream
Related
Published
2021-05-06T13:15:09Z
Modified
2025-10-15T12:15:31.847877Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

Exim 4 before 4.94.2 has Improper Initialization that can lead to recursion-based stack consumption or other consequences. This occurs because use of certain getc functions is mishandled when a client uses BDAT instead of DATA.

References

Affected packages

Git / github.com/exim/exim

Affected ranges

Type
GIT
Repo
https://github.com/exim/exim
Events

Affected versions

exim-4.*

exim-4.90devstart
exim-4.92
exim-4.92-RC1
exim-4.92-RC2
exim-4.92-RC3
exim-4.92-RC4
exim-4.92-RC5
exim-4.92-RC6
exim-4.92-jgh
exim-4.93
exim-4.93-RC0
exim-4.93-RC1
exim-4.93-RC2
exim-4.93-RC3
exim-4.93-RC4
exim-4.93-RC5
exim-4.93-RC6
exim-4.93-RC7
exim-4.94
exim-4.94-RC1
exim-4.94-RC2
exim-4.94.1

Other

exim-4_88
exim-4_89_RC1
exim-4_89_RC3
exim-4_90
exim-4_90_RC1
exim-4_90_RC2
exim-4_90_RC3
exim-4_90_RC4
exim-4_91
exim-4_91_RC1
exim-4_91_RC2
exim-4_91_RC3
exim-4_91_RC4
exim-4_94_RC0

Database specific

vanir_signatures

[
    {
        "signature_type": "Function",
        "deprecated": false,
        "source": "https://github.com/exim/exim/commit/919111edac911ba9c15422eafd7c5bf14d416d26",
        "signature_version": "v1",
        "target": {
            "function": "bdat_ungetc",
            "file": "src/src/smtp_in.c"
        },
        "digest": {
            "function_hash": "85807556721849417698167290800033609961",
            "length": 86.0
        },
        "id": "CVE-2020-28019-a5b97121"
    },
    {
        "signature_type": "Line",
        "deprecated": false,
        "source": "https://github.com/exim/exim/commit/919111edac911ba9c15422eafd7c5bf14d416d26",
        "signature_version": "v1",
        "target": {
            "file": "src/src/smtp_in.c"
        },
        "digest": {
            "threshold": 0.9,
            "line_hashes": [
                "2970847905863908930961351479348962244",
                "259127508678304675853565838131490768076",
                "16856440449629165604374376294870505588",
                "21031574626938302228709321949938569854",
                "66694532801356984293692391694813765468",
                "228435147706632689035739186300622821874",
                "137018139142916213668559470023354199721",
                "262955889687131153967951266340364206508",
                "122233694988885115887188843215612136724",
                "55546132595750780137850156557040648213",
                "178043897109541241882122479475000937559",
                "311496951671523793228361465075141960070"
            ]
        },
        "id": "CVE-2020-28019-f33c15e3"
    }
]