https://bugs.exim.org/show_bug.cgi?id=3001

Jeremy Harris <jgh146...@wizmail.org> changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
           Priority|medium                      |high
           Assignee|unalloca...@exim.org        |jgh146...@wizmail.org
                 CC|                            |exim-dev@lists.exim.org
          Component|Unfiled                     |SMTP Authentication
            Summary|(placeholder)               |infoleak in SPA
                   |                            |authenticator, client

--- Comment #1 from Jeremy Harris <jgh146...@wizmail.org> ---
ZDI-CAN-17433 (Trend Micro)

A crafted SPA challenge from the server can cause the client authenticator
to read OOB; the data is then returned to the server.

Fix: validate the offset contained in the challenge, to avoid reading
past the end of the challenge data structure.

Vulnerable since at least 4.50, probably longer.

-- 
You are receiving this mail because:
You are on the CC list for the bug.

-- 
## subscription configuration (requires account):
##   https://lists.exim.org/mailman3/postorius/lists/exim-dev.lists.exim.org/
## unsubscribe (doesn't require an account):
##   exim-dev-unsubscr...@lists.exim.org
## Exim details at http://www.exim.org/
## Please use the Wiki with this list - http://wiki.exim.org/

Reply via email to