Описание
Exim 4.85 through 4.92 (fixed in 4.92.1) allows remote code execution as root in some unusual configurations that use the ${sort } expansion for items that can be controlled by an attacker (e.g., $local_part or $domain).
Пакеты
| Пакет | Статус | Версия исправления | Релиз | Тип |
|---|---|---|---|---|
| exim4 | fixed | 4.92-10 | package | |
| exim4 | not-affected | jessie | package |
Примечания
https://www.openwall.com/lists/oss-security/2019/07/22/3
https://www.exim.org/static/doc/security/CVE-2019-13917.txt
https://git.exim.org/exim.git/commit/21aa05977abff1eaa69bb97ef99080220915f7c0
EPSS
Связанные уязвимости
Exim 4.85 through 4.92 (fixed in 4.92.1) allows remote code execution as root in some unusual configurations that use the ${sort } expansion for items that can be controlled by an attacker (e.g., $local_part or $domain).
Exim 4.85 through 4.92 (fixed in 4.92.1) allows remote code execution as root in some unusual configurations that use the ${sort } expansion for items that can be controlled by an attacker (e.g., $local_part or $domain).
Exim 4.85 through 4.92 (fixed in 4.92.1) allows remote code execution as root in some unusual configurations that use the ${sort } expansion for items that can be controlled by an attacker (e.g., $local_part or $domain).
Exim 4.85 through 4.92 (fixed in 4.92.1) allows remote code execution as root in some unusual configurations that use the ${sort } expansion for items that can be controlled by an attacker (e.g., $local_part or $domain).
Уязвимость почтового сервера Exim, связанная с ошибками обработки объектов в памяти позволяющая нарушителю повысить свои привилегии и выполнить произвольный код
EPSS