vendor:
Unknown
by:
straight_blast
9.8
CVSS
CRITICAL
Buffer Overflow
120
CWE
Product Name: Unknown
Affected Version From: Unknown
Affected Version To: Unknown
Patch Exists: YES
Related CWE: CVE-2018-6789
CPE: None
Metasploit:
https://www.rapid7.com/db/vulnerabilities/exim-cve-2018-6789/, https://www.rapid7.com/db/vulnerabilities/debian-cve-2018-6789/, https://www.rapid7.com/db/vulnerabilities/alpine-linux-cve-2018-6789/, https://www.rapid7.com/db/vulnerabilities/suse-cve-2018-6789/, https://www.rapid7.com/db/vulnerabilities/amazon_linux-cve-2018-6789/, https://www.rapid7.com/db/vulnerabilities/gentoo-linux-cve-2018-6789/, https://www.rapid7.com/db/vulnerabilities/ubuntu-cve-2018-6789/
Other Scripts:
N/A
Platforms Tested: Linux
2018
CVE-2018-6789 Poc Exploit
This exploit is a proof-of-concept for CVE-2018-6789, which is a buffer overflow vulnerability in the EHLO command of the SMTP protocol. The exploit works by sending an EHLO command with a long string of characters, which causes a buffer overflow and allows the attacker to overwrite the __malloc_hook pointer with the address of a one_gadget. This allows the attacker to execute arbitrary code on the target system.
Mitigation:
The best way to mitigate this vulnerability is to ensure that all systems are running the latest version of the software, and that all security patches are applied.