Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2019-19920

Опубликовано: 22 дек. 2019
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 9
CVSS3: 8.8

Описание

sa-exim 4.2.1 allows attackers to execute arbitrary code if they can write a .cf file or a rule. This occurs because Greylisting.pm relies on eval (rather than direct parsing and/or use of the taint feature). This issue is similar to CVE-2018-11805.

РелизСтатусПримечание
bionic

ignored

end of standard support, was needs-triage
devel

not-affected

4.2.1-19
disco

ignored

end of life
eoan

ignored

end of life
esm-apps/bionic

needs-triage

esm-apps/focal

not-affected

4.2.1-19
esm-apps/jammy

not-affected

4.2.1-19
esm-apps/noble

not-affected

4.2.1-19
esm-apps/xenial

released

4.2.1-14+deb8u1build0.16.04.1
esm-infra-legacy/trusty

DNE

Показывать по

EPSS

Процентиль: 90%
0.05359
Низкий

9 Critical

CVSS2

8.8 High

CVSS3

Связанные уязвимости

CVSS3: 8.8
nvd
почти 6 лет назад

sa-exim 4.2.1 allows attackers to execute arbitrary code if they can write a .cf file or a rule. This occurs because Greylisting.pm relies on eval (rather than direct parsing and/or use of the taint feature). This issue is similar to CVE-2018-11805.

CVSS3: 8.8
debian
почти 6 лет назад

sa-exim 4.2.1 allows attackers to execute arbitrary code if they can w ...

CVSS3: 8.8
github
больше 3 лет назад

sa-exim 4.2.1 allows attackers to execute arbitrary code if they can write a .cf file or a rule. This occurs because Greylisting.pm relies on eval (rather than direct parsing and/or use of the taint feature). This issue is similar to CVE-2018-11805.

EPSS

Процентиль: 90%
0.05359
Низкий

9 Critical

CVSS2

8.8 High

CVSS3