{"id":"CVE-2018-6789","details":"An issue was discovered in the base64d function in the SMTP listener in Exim before 4.90.1. By sending a handcrafted message, a buffer overflow may happen. This can be used to execute code remotely.","modified":"2026-04-11T21:33:04.193533Z","published":"2018-02-08T23:29:01.170Z","related":["openSUSE-SU-2021:0677-1","openSUSE-SU-2021:0753-1","openSUSE-SU-2021:0754-1","openSUSE-SU-2024:10746-1"],"database_specific":{"unresolved_ranges":[{"extracted_events":[{"last_affected":"14.04"}],"source":"CPE_FIELD","cpe":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*"},{"extracted_events":[{"last_affected":"16.04"}],"source":"CPE_FIELD","cpe":"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*"},{"extracted_events":[{"last_affected":"17.10"}],"source":"CPE_FIELD","cpe":"cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*"},{"extracted_events":[{"last_affected":"7.0"}],"source":"CPE_FIELD","cpe":"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"},{"extracted_events":[{"last_affected":"8.0"}],"source":"CPE_FIELD","cpe":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"extracted_events":[{"last_affected":"9.0"}],"source":"CPE_FIELD","cpe":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"}]},"references":[{"type":"WEB","url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2018-6789"},{"type":"ADVISORY","url":"http://openwall.com/lists/oss-security/2018/02/10/2"},{"type":"ADVISORY","url":"http://www.openwall.com/lists/oss-security/2018/02/07/2"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/103049"},{"type":"ADVISORY","url":"http://www.securitytracker.com/id/1040461"},{"type":"ADVISORY","url":"https://exim.org/static/doc/security/CVE-2018-6789.txt"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2018/02/msg00009.html"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/3565-1/"},{"type":"ADVISORY","url":"https://www.debian.org/security/2018/dsa-4110"},{"type":"FIX","url":"https://git.exim.org/exim.git/commit/cf3cd306062a08969c41a1cdd32c6855f1abecf1"},{"type":"EVIDENCE","url":"http://packetstormsecurity.com/files/162959/Exim-base64d-Buffer-Overflow.html"},{"type":"EVIDENCE","url":"https://devco.re/blog/2018/03/06/exim-off-by-one-RCE-exploiting-CVE-2018-6789-en/"},{"type":"EVIDENCE","url":"https://www.exploit-db.com/exploits/44571/"},{"type":"EVIDENCE","url":"https://www.exploit-db.com/exploits/45671/"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/exim/exim","events":[{"introduced":"0"},{"fixed":"062990cc1b2f9e5d82a413b53c8f0569075de700"}],"database_specific":{"extracted_events":[{"introduced":"0"},{"fixed":"4.90.1"}],"source":"CPE_FIELD","cpe":"cpe:2.3:a:exim:exim:*:*:*:*:*:*:*:*"}}],"versions":["DEVEL_PDKIM_START","exim-4.90.0.22","exim-4.90.0.27","exim-4.90devstart","exim-4_50","exim-4_51","exim-4_52","exim-4_53","exim-4_54","exim-4_61","exim-4_62","exim-4_63","exim-4_64","exim-4_65","exim-4_66","exim-4_67","exim-4_68","exim-4_69","exim-4_70","exim-4_70_RC3","exim-4_70_RC4","exim-4_71","exim-4_72","exim-4_72_RC1","exim-4_72_RC2","exim-4_73","exim-4_73_RC00","exim-4_73_RC1","exim-4_74","exim-4_74_RC1","exim-4_75","exim-4_75_RC1","exim-4_75_RC2","exim-4_75_RC3","exim-4_76","exim-4_76_RC1","exim-4_76_RC2","exim-4_77","exim-4_77_RC1","exim-4_77_RC2","exim-4_77_RC3","exim-4_77_RC4","exim-4_80","exim-4_80_RC1","exim-4_80_RC2","exim-4_80_RC3","exim-4_80_RC4","exim-4_80_RC5","exim-4_80_RC6","exim-4_80_RC7","exim-4_82","exim-4_82_RC1","exim-4_82_RC2","exim-4_82_RC3","exim-4_82_RC4","exim-4_82_RC5","exim-4_83","exim-4_83_RC1","exim-4_83_RC2","exim-4_83_RC3","exim-4_84","exim-4_84_RC1","exim-4_84_RC2","exim-4_85","exim-4_85_RC1","exim-4_85_RC2","exim-4_85_RC3","exim-4_85_RC4","exim-4_86","exim-4_86_RC1","exim-4_86_RC2","exim-4_86_RC3","exim-4_86_RC4","exim-4_86_RC5","exim-4_87","exim-4_87_RC1","exim-4_87_RC2","exim-4_87_RC3","exim-4_87_RC4","exim-4_87_RC5","exim-4_87_RC6","exim-4_87_RC7","exim-4_88","exim-4_88_RC1","exim-4_88_RC2","exim-4_88_RC3","exim-4_88_RC4","exim-4_88_RC5","exim-4_88_RC6","exim-4_89_RC1","exim-4_89_RC3","exim-4_90","exim-4_90_RC1","exim-4_90_RC2","exim-4_90_RC3","exim-4_90_RC4"],"database_specific":{"vanir_signatures_modified":"2026-04-11T21:33:04Z","source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2018-6789.json","vanir_signatures":[{"signature_version":"v1","target":{"file":"src/src/base64.c"},"source":"https://github.com/exim/exim/commit/062990cc1b2f9e5d82a413b53c8f0569075de700","id":"CVE-2018-6789-73a6114c","signature_type":"Line","digest":{"line_hashes":["122224066439306498454973631177314728388","210469213499539750685364841753279363702","310130664126710556834765260497258691414","6805203262403384879653734729276640848","305471110171980478227503339989024839730","96132330816761905364820075878497895364","67183745914449294531187667849448072066"],"threshold":0.9},"deprecated":false},{"signature_version":"v1","target":{"function":"b64decode","file":"src/src/base64.c"},"source":"https://github.com/exim/exim/commit/062990cc1b2f9e5d82a413b53c8f0569075de700","id":"CVE-2018-6789-ab775a72","signature_type":"Function","digest":{"function_hash":"277874649775681361413437847669575739043","length":1076},"deprecated":false}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}