Date: Tue, 11 May 2021 22:22:19 +0000 From: Qualys Security Advisory <qsa@...lys.com> To: null p0int3r <nullp0int3rx@...il.com> CC: "oss-security@...ts.openwall.com" <oss-security@...ts.openwall.com> Subject: Re: [CVE-2020-28018] Use-After-Free on Exim Question Hi, On Tue, May 11, 2021 at 11:18:12PM +0200, null p0int3r wrote: > In the advisory it is mentioned the use of the name=value pair, but reading > the code I see just string based functions used for allocations. One of the name=value parameters for MAIL FROM is special, because it can allocate arbitrary (binary) characters (hint: we also used it to exploit another vulnerability in the advisory)! With best regards, -- the Qualys Security Advisory team [https://d1dejaj6dcqv24.cloudfront.net/asset/image/email-banner-384-2x.png]<https://www.qualys.com/email-banner> This message may contain confidential and privileged information. If it has been sent to you in error, please reply to advise the sender of the error and then immediately delete it. If you are not the intended recipient, do not read, copy, disclose or otherwise use this message. The sender disclaims any liability for such unauthorized use. NOTE that all incoming emails sent to Qualys email accounts will be archived and may be scanned by us and/or by external service providers to detect and prevent threats to our systems, investigate illegal or inappropriate behavior, and/or eliminate unsolicited promotional emails (“spam”). If you have any concerns about this process, please contact us.
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.