Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2020-28008

Опубликовано: 06 мая 2021
Источник: debian
EPSS Низкий

Описание

Exim 4 before 4.94.2 allows Execution with Unnecessary Privileges. Because Exim operates as root in the spool directory (owned by a non-root user), an attacker can write to a /var/spool/exim4/input spool header file, in which a crafted recipient address can indirectly lead to command execution.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
exim4fixed4.94.2-1package

Примечания

  • https://www.openwall.com/lists/oss-security/2021/05/04/7

EPSS

Процентиль: 36%
0.00146
Низкий

Связанные уязвимости

CVSS3: 7.8
ubuntu
больше 4 лет назад

Exim 4 before 4.94.2 allows Execution with Unnecessary Privileges. Because Exim operates as root in the spool directory (owned by a non-root user), an attacker can write to a /var/spool/exim4/input spool header file, in which a crafted recipient address can indirectly lead to command execution.

CVSS3: 7.8
nvd
больше 4 лет назад

Exim 4 before 4.94.2 allows Execution with Unnecessary Privileges. Because Exim operates as root in the spool directory (owned by a non-root user), an attacker can write to a /var/spool/exim4/input spool header file, in which a crafted recipient address can indirectly lead to command execution.

github
больше 3 лет назад

Exim 4 before 4.94.2 allows Execution with Unnecessary Privileges. Because Exim operates as root in the spool directory (owned by a non-root user), an attacker can write to a /var/spool/exim4/input spool header file, in which a crafted recipient address can indirectly lead to command execution.

CVSS3: 7.8
fstec
около 5 лет назад

Уязвимость агента пересылки сообщений Exim, связанная с ошибками управления привилегиями, позволяющая нарушителю повысить привилегии в системе

suse-cvrf
больше 4 лет назад

Security update for exim

EPSS

Процентиль: 36%
0.00146
Низкий