Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2019-19920

Опубликовано: 22 дек. 2019
Источник: debian
EPSS Низкий

Описание

sa-exim 4.2.1 allows attackers to execute arbitrary code if they can write a .cf file or a rule. This occurs because Greylisting.pm relies on eval (rather than direct parsing and/or use of the taint feature). This issue is similar to CVE-2018-11805.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
sa-eximfixed4.2.1-19package
sa-eximno-dsabusterpackage
sa-eximno-dsastretchpackage

Примечания

  • https://bugs.debian.org/946829#24

  • https://marc.info/?l=spamassassin-users&m=157668107325768&w=2

  • https://marc.info/?l=spamassassin-users&m=157668305026635&w=2

  • The issue is "effectively" mitigating due to the CVE-2018-11805 fix in

  • spamassassin, making the Greylisting.pm non-functional (and so a functional

  • regression as well as tracked in #946829). The security implications are

  • as well documented in /usr/share/doc/sa-exim/README.greylisting.gz

EPSS

Процентиль: 90%
0.05359
Низкий

Связанные уязвимости

CVSS3: 8.8
ubuntu
почти 6 лет назад

sa-exim 4.2.1 allows attackers to execute arbitrary code if they can write a .cf file or a rule. This occurs because Greylisting.pm relies on eval (rather than direct parsing and/or use of the taint feature). This issue is similar to CVE-2018-11805.

CVSS3: 8.8
nvd
почти 6 лет назад

sa-exim 4.2.1 allows attackers to execute arbitrary code if they can write a .cf file or a rule. This occurs because Greylisting.pm relies on eval (rather than direct parsing and/or use of the taint feature). This issue is similar to CVE-2018-11805.

CVSS3: 8.8
github
больше 3 лет назад

sa-exim 4.2.1 allows attackers to execute arbitrary code if they can write a .cf file or a rule. This occurs because Greylisting.pm relies on eval (rather than direct parsing and/or use of the taint feature). This issue is similar to CVE-2018-11805.

EPSS

Процентиль: 90%
0.05359
Низкий