Exim 4 before 4.92 allows Integer Overflow to Buffer Overflow, in which an unauthenticated remote attacker can execute arbitrary code by leveraging the mishandling of continuation lines during header-length restriction.
{ "vanir_signatures": [ { "signature_version": "v1", "signature_type": "Line", "target": { "file": "src/src/smtp_in.c" }, "id": "CVE-2020-28020-1522f0d7", "digest": { "line_hashes": [ "141166236224459274535551626864839869666", "174352176653700224194965995710414839471", "253039306938586898545558896654873110353", "195708166821209130084578053240344760208" ], "threshold": 0.9 }, "deprecated": false, "source": "https://github.com/exim/exim/commit/ae63862ba6f6ee0c17ec865cc6cf0eebb3ca2389" }, { "signature_version": "v1", "signature_type": "Function", "target": { "file": "src/src/smtp_in.c", "function": "smtp_reset" }, "id": "CVE-2020-28020-32bbe9ef", "digest": { "length": 2856.0, "function_hash": "24326669637228286557130795243383876882" }, "deprecated": false, "source": "https://github.com/exim/exim/commit/ae63862ba6f6ee0c17ec865cc6cf0eebb3ca2389" } ] }