Search for vulnerabilities
Vulnerability details: VCID-f5fh-ps3p-aaah
Vulnerability ID VCID-f5fh-ps3p-aaah
Aliases CVE-2018-6789
Summary An issue was discovered in the base64d function in the SMTP listener in Exim before 4.90.1. By sending a handcrafted message, a buffer overflow may happen. This can be used to execute code remotely.
Status Published
Exploitability 2.0
Weighted Severity 9.0
Risk 10.0
Affected and Fixed Packages Package Details
Weaknesses (2)
System Score Found at
cvssv3.1 9.8 http://openwall.com/lists/oss-security/2018/02/10/2
cvssv3.1 9.8 http://openwall.com/lists/oss-security/2018/02/10/2
ssvc Act http://openwall.com/lists/oss-security/2018/02/10/2
ssvc Act http://openwall.com/lists/oss-security/2018/02/10/2
cvssv3.1 9.8 http://packetstormsecurity.com/files/162959/Exim-base64d-Buffer-Overflow.html
cvssv3.1 9.8 http://packetstormsecurity.com/files/162959/Exim-base64d-Buffer-Overflow.html
ssvc Act http://packetstormsecurity.com/files/162959/Exim-base64d-Buffer-Overflow.html
ssvc Act http://packetstormsecurity.com/files/162959/Exim-base64d-Buffer-Overflow.html
generic_textual Medium http://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-6789.html
cvssv3 8.1 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-6789.json
epss 0.72078 https://api.first.org/data/v1/epss?cve=CVE-2018-6789
epss 0.72078 https://api.first.org/data/v1/epss?cve=CVE-2018-6789
epss 0.72078 https://api.first.org/data/v1/epss?cve=CVE-2018-6789
epss 0.72078 https://api.first.org/data/v1/epss?cve=CVE-2018-6789
epss 0.72078 https://api.first.org/data/v1/epss?cve=CVE-2018-6789
epss 0.72078 https://api.first.org/data/v1/epss?cve=CVE-2018-6789
epss 0.72078 https://api.first.org/data/v1/epss?cve=CVE-2018-6789
epss 0.72078 https://api.first.org/data/v1/epss?cve=CVE-2018-6789
epss 0.72078 https://api.first.org/data/v1/epss?cve=CVE-2018-6789
epss 0.72078 https://api.first.org/data/v1/epss?cve=CVE-2018-6789
epss 0.72078 https://api.first.org/data/v1/epss?cve=CVE-2018-6789
epss 0.72078 https://api.first.org/data/v1/epss?cve=CVE-2018-6789
epss 0.74459 https://api.first.org/data/v1/epss?cve=CVE-2018-6789
epss 0.74459 https://api.first.org/data/v1/epss?cve=CVE-2018-6789
epss 0.74459 https://api.first.org/data/v1/epss?cve=CVE-2018-6789
epss 0.74459 https://api.first.org/data/v1/epss?cve=CVE-2018-6789
epss 0.74459 https://api.first.org/data/v1/epss?cve=CVE-2018-6789
epss 0.74459 https://api.first.org/data/v1/epss?cve=CVE-2018-6789
epss 0.74459 https://api.first.org/data/v1/epss?cve=CVE-2018-6789
epss 0.74459 https://api.first.org/data/v1/epss?cve=CVE-2018-6789
epss 0.74459 https://api.first.org/data/v1/epss?cve=CVE-2018-6789
epss 0.74459 https://api.first.org/data/v1/epss?cve=CVE-2018-6789
epss 0.74459 https://api.first.org/data/v1/epss?cve=CVE-2018-6789
epss 0.74459 https://api.first.org/data/v1/epss?cve=CVE-2018-6789
epss 0.74459 https://api.first.org/data/v1/epss?cve=CVE-2018-6789
epss 0.74459 https://api.first.org/data/v1/epss?cve=CVE-2018-6789
epss 0.74459 https://api.first.org/data/v1/epss?cve=CVE-2018-6789
epss 0.74459 https://api.first.org/data/v1/epss?cve=CVE-2018-6789
epss 0.74459 https://api.first.org/data/v1/epss?cve=CVE-2018-6789
epss 0.74972 https://api.first.org/data/v1/epss?cve=CVE-2018-6789
epss 0.74972 https://api.first.org/data/v1/epss?cve=CVE-2018-6789
epss 0.74972 https://api.first.org/data/v1/epss?cve=CVE-2018-6789
epss 0.74972 https://api.first.org/data/v1/epss?cve=CVE-2018-6789
epss 0.74972 https://api.first.org/data/v1/epss?cve=CVE-2018-6789
epss 0.84261 https://api.first.org/data/v1/epss?cve=CVE-2018-6789
epss 0.84455 https://api.first.org/data/v1/epss?cve=CVE-2018-6789
epss 0.84925 https://api.first.org/data/v1/epss?cve=CVE-2018-6789
epss 0.88879 https://api.first.org/data/v1/epss?cve=CVE-2018-6789
epss 0.94064 https://api.first.org/data/v1/epss?cve=CVE-2018-6789
epss 0.94064 https://api.first.org/data/v1/epss?cve=CVE-2018-6789
epss 0.94064 https://api.first.org/data/v1/epss?cve=CVE-2018-6789
epss 0.94064 https://api.first.org/data/v1/epss?cve=CVE-2018-6789
epss 0.95806 https://api.first.org/data/v1/epss?cve=CVE-2018-6789
epss 0.95806 https://api.first.org/data/v1/epss?cve=CVE-2018-6789
epss 0.95806 https://api.first.org/data/v1/epss?cve=CVE-2018-6789
epss 0.95806 https://api.first.org/data/v1/epss?cve=CVE-2018-6789
epss 0.95806 https://api.first.org/data/v1/epss?cve=CVE-2018-6789
epss 0.95806 https://api.first.org/data/v1/epss?cve=CVE-2018-6789
epss 0.95806 https://api.first.org/data/v1/epss?cve=CVE-2018-6789
epss 0.95806 https://api.first.org/data/v1/epss?cve=CVE-2018-6789
rhbs urgent https://bugzilla.redhat.com/show_bug.cgi?id=1543268
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6789
cvssv3.1 9.8 https://devco.re/blog/2018/03/06/exim-off-by-one-RCE-exploiting-CVE-2018-6789-en/
cvssv3.1 9.8 https://devco.re/blog/2018/03/06/exim-off-by-one-RCE-exploiting-CVE-2018-6789-en/
ssvc Act https://devco.re/blog/2018/03/06/exim-off-by-one-RCE-exploiting-CVE-2018-6789-en/
ssvc Act https://devco.re/blog/2018/03/06/exim-off-by-one-RCE-exploiting-CVE-2018-6789-en/
cvssv3.1 9.8 https://exim.org/static/doc/security/CVE-2018-6789.txt
cvssv3.1 9.8 https://exim.org/static/doc/security/CVE-2018-6789.txt
generic_textual Medium https://exim.org/static/doc/security/CVE-2018-6789.txt
ssvc Act https://exim.org/static/doc/security/CVE-2018-6789.txt
ssvc Act https://exim.org/static/doc/security/CVE-2018-6789.txt
cvssv3.1 9.8 https://git.exim.org/exim.git/commit/cf3cd306062a08969c41a1cdd32c6855f1abecf1
cvssv3.1 9.8 https://git.exim.org/exim.git/commit/cf3cd306062a08969c41a1cdd32c6855f1abecf1
ssvc Act https://git.exim.org/exim.git/commit/cf3cd306062a08969c41a1cdd32c6855f1abecf1
ssvc Act https://git.exim.org/exim.git/commit/cf3cd306062a08969c41a1cdd32c6855f1abecf1
cvssv3.1 9.8 https://lists.debian.org/debian-lts-announce/2018/02/msg00009.html
cvssv3.1 9.8 https://lists.debian.org/debian-lts-announce/2018/02/msg00009.html
ssvc Act https://lists.debian.org/debian-lts-announce/2018/02/msg00009.html
ssvc Act https://lists.debian.org/debian-lts-announce/2018/02/msg00009.html
cvssv2 7.5 https://nvd.nist.gov/vuln/detail/CVE-2018-6789
cvssv3 9.8 https://nvd.nist.gov/vuln/detail/CVE-2018-6789
cvssv3 9.8 https://nvd.nist.gov/vuln/detail/CVE-2018-6789
cvssv3.1 9.8 https://nvd.nist.gov/vuln/detail/CVE-2018-6789
archlinux High https://security.archlinux.org/AVG-608
generic_textual Medium https://ubuntu.com/security/notices/USN-3565-1
cvssv3.1 9.8 https://usn.ubuntu.com/3565-1/
cvssv3.1 9.8 https://usn.ubuntu.com/3565-1/
ssvc Act https://usn.ubuntu.com/3565-1/
ssvc Act https://usn.ubuntu.com/3565-1/
cvssv3.1 9.8 https://www.debian.org/security/2018/dsa-4110
cvssv3.1 9.8 https://www.debian.org/security/2018/dsa-4110
ssvc Act https://www.debian.org/security/2018/dsa-4110
ssvc Act https://www.debian.org/security/2018/dsa-4110
cvssv3.1 9.8 https://www.exploit-db.com/exploits/44571/
cvssv3.1 9.8 https://www.exploit-db.com/exploits/44571/
ssvc Act https://www.exploit-db.com/exploits/44571/
ssvc Act https://www.exploit-db.com/exploits/44571/
cvssv3.1 9.8 https://www.exploit-db.com/exploits/45671/
cvssv3.1 9.8 https://www.exploit-db.com/exploits/45671/
ssvc Act https://www.exploit-db.com/exploits/45671/
ssvc Act https://www.exploit-db.com/exploits/45671/
cvssv3.1 9.8 http://www.openwall.com/lists/oss-security/2018/02/07/2
cvssv3.1 9.8 http://www.openwall.com/lists/oss-security/2018/02/07/2
generic_textual Medium http://www.openwall.com/lists/oss-security/2018/02/07/2
ssvc Act http://www.openwall.com/lists/oss-security/2018/02/07/2
ssvc Act http://www.openwall.com/lists/oss-security/2018/02/07/2
cvssv3.1 9.8 http://www.securityfocus.com/bid/103049
cvssv3.1 9.8 http://www.securityfocus.com/bid/103049
ssvc Act http://www.securityfocus.com/bid/103049
ssvc Act http://www.securityfocus.com/bid/103049
cvssv3.1 9.8 http://www.securitytracker.com/id/1040461
cvssv3.1 9.8 http://www.securitytracker.com/id/1040461
ssvc Act http://www.securitytracker.com/id/1040461
ssvc Act http://www.securitytracker.com/id/1040461
Reference id Reference type URL
http://openwall.com/lists/oss-security/2018/02/10/2
http://packetstormsecurity.com/files/162959/Exim-base64d-Buffer-Overflow.html
http://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-6789.html
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-6789.json
https://api.first.org/data/v1/epss?cve=CVE-2018-6789
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6789
https://devco.re/blog/2018/03/06/exim-off-by-one-RCE-exploiting-CVE-2018-6789-en/
https://exim.org/static/doc/security/CVE-2018-6789.txt
https://git.exim.org/exim.git/commit/cf3cd306062a08969c41a1cdd32c6855f1abecf1
https://lists.debian.org/debian-lts-announce/2018/02/msg00009.html
https://ubuntu.com/security/notices/USN-3565-1
https://usn.ubuntu.com/3565-1/
https://www.debian.org/security/2018/dsa-4110
https://www.exploit-db.com/exploits/44571/
https://www.exploit-db.com/exploits/45671/
http://www.openwall.com/lists/oss-security/2018/02/07/2
http://www.securityfocus.com/bid/103049
http://www.securitytracker.com/id/1040461
1543268 https://bugzilla.redhat.com/show_bug.cgi?id=1543268
890000 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=890000
ASA-201802-6 https://security.archlinux.org/ASA-201802-6
AVG-608 https://security.archlinux.org/AVG-608
cpe:2.3:a:exim:exim:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:*:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
CVE-2018-6789 Exploit https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/44571.py
CVE-2018-6789 Exploit https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/45671.py
CVE-2018-6789 Exploit https://medium.com/@straightblast426/my-poc-walk-through-for-cve-2018-6789-2e402e4ff588
CVE-2018-6789 https://nvd.nist.gov/vuln/detail/CVE-2018-6789
GLSA-201803-01 https://security.gentoo.org/glsa/201803-01
Data source Exploit-DB
Date added May 2, 2018
Description Exim < 4.90.1 - 'base64d' Remote Code Execution
Ransomware campaign use Unknown
Source publication date May 2, 2018
Exploit type remote
Platform linux
Source update date May 2, 2018
Source URL https://medium.com/@straightblast426/my-poc-walk-through-for-cve-2018-6789-2e402e4ff588
Data source KEV
Date added Nov. 3, 2021
Description Exim contains a buffer overflow vulnerability in the base64d function part of the SMTP listener that may allow for remote code execution.
Required action Apply updates per vendor instructions.
Due date May 3, 2022
Note
https://nvd.nist.gov/vuln/detail/CVE-2018-6789
Ransomware campaign use Known
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at http://openwall.com/lists/oss-security/2018/02/10/2
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at http://openwall.com/lists/oss-security/2018/02/10/2
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T14:03:40Z/ Found at http://openwall.com/lists/oss-security/2018/02/10/2

Vector: SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T14:03:40Z/ Found at http://openwall.com/lists/oss-security/2018/02/10/2
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at http://packetstormsecurity.com/files/162959/Exim-base64d-Buffer-Overflow.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at http://packetstormsecurity.com/files/162959/Exim-base64d-Buffer-Overflow.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T14:03:40Z/ Found at http://packetstormsecurity.com/files/162959/Exim-base64d-Buffer-Overflow.html

Vector: SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T14:03:40Z/ Found at http://packetstormsecurity.com/files/162959/Exim-base64d-Buffer-Overflow.html
Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-6789.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://devco.re/blog/2018/03/06/exim-off-by-one-RCE-exploiting-CVE-2018-6789-en/
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://devco.re/blog/2018/03/06/exim-off-by-one-RCE-exploiting-CVE-2018-6789-en/
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T14:03:40Z/ Found at https://devco.re/blog/2018/03/06/exim-off-by-one-RCE-exploiting-CVE-2018-6789-en/

Vector: SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T14:03:40Z/ Found at https://devco.re/blog/2018/03/06/exim-off-by-one-RCE-exploiting-CVE-2018-6789-en/
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://exim.org/static/doc/security/CVE-2018-6789.txt
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://exim.org/static/doc/security/CVE-2018-6789.txt
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T14:03:40Z/ Found at https://exim.org/static/doc/security/CVE-2018-6789.txt

Vector: SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T14:03:40Z/ Found at https://exim.org/static/doc/security/CVE-2018-6789.txt
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://git.exim.org/exim.git/commit/cf3cd306062a08969c41a1cdd32c6855f1abecf1
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://git.exim.org/exim.git/commit/cf3cd306062a08969c41a1cdd32c6855f1abecf1
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T14:03:40Z/ Found at https://git.exim.org/exim.git/commit/cf3cd306062a08969c41a1cdd32c6855f1abecf1

Vector: SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T14:03:40Z/ Found at https://git.exim.org/exim.git/commit/cf3cd306062a08969c41a1cdd32c6855f1abecf1
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://lists.debian.org/debian-lts-announce/2018/02/msg00009.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://lists.debian.org/debian-lts-announce/2018/02/msg00009.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T14:03:40Z/ Found at https://lists.debian.org/debian-lts-announce/2018/02/msg00009.html

Vector: SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T14:03:40Z/ Found at https://lists.debian.org/debian-lts-announce/2018/02/msg00009.html
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P Found at https://nvd.nist.gov/vuln/detail/CVE-2018-6789
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2018-6789
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2018-6789
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2018-6789
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://usn.ubuntu.com/3565-1/
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://usn.ubuntu.com/3565-1/
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T14:03:40Z/ Found at https://usn.ubuntu.com/3565-1/

Vector: SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T14:03:40Z/ Found at https://usn.ubuntu.com/3565-1/
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://www.debian.org/security/2018/dsa-4110
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://www.debian.org/security/2018/dsa-4110
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T14:03:40Z/ Found at https://www.debian.org/security/2018/dsa-4110

Vector: SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T14:03:40Z/ Found at https://www.debian.org/security/2018/dsa-4110
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://www.exploit-db.com/exploits/44571/
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://www.exploit-db.com/exploits/44571/
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T14:03:40Z/ Found at https://www.exploit-db.com/exploits/44571/

Vector: SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T14:03:40Z/ Found at https://www.exploit-db.com/exploits/44571/
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://www.exploit-db.com/exploits/45671/
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://www.exploit-db.com/exploits/45671/
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T14:03:40Z/ Found at https://www.exploit-db.com/exploits/45671/

Vector: SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T14:03:40Z/ Found at https://www.exploit-db.com/exploits/45671/
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at http://www.openwall.com/lists/oss-security/2018/02/07/2
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at http://www.openwall.com/lists/oss-security/2018/02/07/2
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T14:03:40Z/ Found at http://www.openwall.com/lists/oss-security/2018/02/07/2

Vector: SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T14:03:40Z/ Found at http://www.openwall.com/lists/oss-security/2018/02/07/2
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at http://www.securityfocus.com/bid/103049
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at http://www.securityfocus.com/bid/103049
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T14:03:40Z/ Found at http://www.securityfocus.com/bid/103049

Vector: SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T14:03:40Z/ Found at http://www.securityfocus.com/bid/103049
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at http://www.securitytracker.com/id/1040461
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at http://www.securitytracker.com/id/1040461
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T14:03:40Z/ Found at http://www.securitytracker.com/id/1040461

Vector: SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T14:03:40Z/ Found at http://www.securitytracker.com/id/1040461
Exploit Prediction Scoring System (EPSS)
Percentile 0.98642
EPSS Score 0.72078
Published At April 29, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
There are no relevant records.