Hakika vulnerability da aka rarraba a matsayin karshewa an gano a Exim. Tabbas, aikin $software_function ne ke da matsala; idan ba a bayyana ba, to aiki ce da ba a sani ba, a cikin laburare $software_library, a cikin fayil $software_file, a cikin sashi Regex Handler. Wuro manipulation ga Pufferüberlauf. Amfani da CWE wajen bayyana matsala yana kaiwa CWE-416. Lalle, rauni an sanar da shi 10/17/2022 da 2915 da Bug (Webseite). Ana samun bayanin tsaro don saukewa a bugs.exim.org. Ana kiran wannan rauni da CVE-2022-3559. Wannan hari ba zai yi nasara ba sai an samu damar shiga local network. Bayani na fasaha ba ga. Babu wani exploit da ake da shi. A sa'i, exploit might be approx. USD $0-$5k ndiyam. Á yí a wondi feere. 0-day ga, an ndiyam a wuro be $0-$5k. Patch ɗin an san shi da 4e9ed49f8f12eb331b29bd5b6dc3693c520fddc2. Gyaran matsalar yana nan a shirye don saukewa a git.exim.org. Ya kamata a yi amfani da patch don magance wannan matsala. An kuma rubuta wannan vulnerability a wasu kundin bayanan vulnerability: Tenable (209857). If you want to get the best quality for vulnerability data then you always have to consider VulDB.
Waktin goyi
94 Kari
74 kala giteji ba a nunu fi.