https://bugs.exim.org/show_bug.cgi?id=2449

--- Comment #5 from Heiko Schlittermann <[email protected]> ---
(In reply to areuu from comment #4)
> Please credit my team QAX A-TEAM.

The statement in the source will start as shown below.

CVE ID:     CVE-2019-16928
Date:       2019-09-27 (CVE assigned)
Version(s): from 4.92 up to and including 4.92.2
Reporter:   QAX-A-TEAM <[email protected]>
Reference:  https://bugs.exim.org/show_bug.cgi?id=2449
Issue:      Heap-based buffer overflow in string_vformat,
            remote code execution seems to be possible

-- 
You are receiving this mail because:
You are on the CC list for the bug.
-- 
## List details at https://lists.exim.org/mailman/listinfo/exim-dev Exim 
details at http://www.exim.org/ ##

Reply via email to