{"id":"CVE-2020-28019","details":"Exim 4 before 4.94.2 has Improper Initialization that can lead to recursion-based stack consumption or other consequences. This occurs because use of certain getc functions is mishandled when a client uses BDAT instead of DATA.","modified":"2026-04-11T23:12:49.203707Z","published":"2021-05-06T13:15:09.587Z","related":["openSUSE-SU-2021:0677-1","openSUSE-SU-2021:0753-1","openSUSE-SU-2021:0754-1","openSUSE-SU-2024:10746-1"],"references":[{"type":"ADVISORY","url":"https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28019-BDATA.txt"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/exim/exim","events":[{"introduced":"57091745e6d5ce4259c645b3ac63838668d55b7f"},{"fixed":"919111edac911ba9c15422eafd7c5bf14d416d26"}],"database_specific":{"extracted_events":[{"introduced":"4.88"},{"fixed":"4.94.2"}],"source":"CPE_FIELD","cpe":"cpe:2.3:a:exim:exim:*:*:*:*:*:*:*:*"}}],"versions":["exim-4.90devstart","exim-4.92","exim-4.92-RC1","exim-4.92-RC2","exim-4.92-RC3","exim-4.92-RC4","exim-4.92-RC5","exim-4.92-RC6","exim-4.92-jgh","exim-4.93","exim-4.93-RC0","exim-4.93-RC1","exim-4.93-RC2","exim-4.93-RC3","exim-4.93-RC4","exim-4.93-RC5","exim-4.93-RC6","exim-4.93-RC7","exim-4.94","exim-4.94-RC1","exim-4.94-RC2","exim-4.94.1","exim-4_88","exim-4_89_RC1","exim-4_89_RC3","exim-4_90","exim-4_90_RC1","exim-4_90_RC2","exim-4_90_RC3","exim-4_90_RC4","exim-4_91","exim-4_91_RC1","exim-4_91_RC2","exim-4_91_RC3","exim-4_91_RC4","exim-4_94_RC0"],"database_specific":{"vanir_signatures_modified":"2026-04-11T23:12:49Z","source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2020-28019.json","vanir_signatures":[{"signature_type":"Function","source":"https://github.com/exim/exim/commit/919111edac911ba9c15422eafd7c5bf14d416d26","id":"CVE-2020-28019-a5b97121","digest":{"length":86,"function_hash":"85807556721849417698167290800033609961"},"signature_version":"v1","deprecated":false,"target":{"file":"src/src/smtp_in.c","function":"bdat_ungetc"}},{"signature_type":"Line","source":"https://github.com/exim/exim/commit/919111edac911ba9c15422eafd7c5bf14d416d26","id":"CVE-2020-28019-f33c15e3","digest":{"line_hashes":["2970847905863908930961351479348962244","259127508678304675853565838131490768076","16856440449629165604374376294870505588","21031574626938302228709321949938569854","66694532801356984293692391694813765468","228435147706632689035739186300622821874","137018139142916213668559470023354199721","262955889687131153967951266340364206508","122233694988885115887188843215612136724","55546132595750780137850156557040648213","178043897109541241882122479475000937559","311496951671523793228361465075141960070"],"threshold":0.9},"signature_version":"v1","deprecated":false,"target":{"file":"src/src/smtp_in.c"}}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}