Unrated severityNVD Advisory· Published May 2, 2005· Updated Apr 16, 2026
CVE-2005-0022
CVE-2005-0022
Description
Buffer overflow in the spa_base64_to_bits function in Exim before 4.43, as originally obtained from Samba code, and as called by the auth_spa_client function, may allow attackers to execute arbitrary code during SPA authentication.
Affected products
3cpe:2.3:a:university_of_cambridge:exim:*:*:*:*:*:*:*:*+ 2 more
- cpe:2.3:a:university_of_cambridge:exim:*:*:*:*:*:*:*:*range: <=4.40
- cpe:2.3:a:university_of_cambridge:exim:4.41:*:*:*:*:*:*:*
- cpe:2.3:a:university_of_cambridge:exim:4.42:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
8- www.exim.org/mail-archives/exim-users/Week-of-Mon-20050103/msg00028.htmlnvdPatch
- www.redhat.com/support/errata/RHSA-2005-025.htmlnvdPatch
- security.gentoo.org/glsa/glsa-200501-23.xmlnvdVendor Advisory
- ftp6.us.freebsd.org/pub/mail/exim/ChangeLogs/ChangeLog-4.44nvd
- marc.infonvd
- www.idefense.com/application/poi/displaynvd
- www.securityfocus.com/bid/12188nvd
- oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11293nvd
News mentions
0No linked articles in our index yet.