Описание
sa-exim 4.2.1 allows attackers to execute arbitrary code if they can write a .cf file or a rule. This occurs because Greylisting.pm relies on eval (rather than direct parsing and/or use of the taint feature). This issue is similar to CVE-2018-11805.
| Релиз | Статус | Примечание |
|---|---|---|
| bionic | ignored | end of standard support, was needs-triage |
| devel | not-affected | 4.2.1-19 |
| disco | ignored | end of life |
| eoan | ignored | end of life |
| esm-apps/bionic | needs-triage | |
| esm-apps/focal | not-affected | 4.2.1-19 |
| esm-apps/jammy | not-affected | 4.2.1-19 |
| esm-apps/noble | not-affected | 4.2.1-19 |
| esm-apps/xenial | released | 4.2.1-14+deb8u1build0.16.04.1 |
| esm-infra-legacy/trusty | DNE |
Показывать по
EPSS
9 Critical
CVSS2
8.8 High
CVSS3
Связанные уязвимости
sa-exim 4.2.1 allows attackers to execute arbitrary code if they can write a .cf file or a rule. This occurs because Greylisting.pm relies on eval (rather than direct parsing and/or use of the taint feature). This issue is similar to CVE-2018-11805.
sa-exim 4.2.1 allows attackers to execute arbitrary code if they can w ...
sa-exim 4.2.1 allows attackers to execute arbitrary code if they can write a .cf file or a rule. This occurs because Greylisting.pm relies on eval (rather than direct parsing and/or use of the taint feature). This issue is similar to CVE-2018-11805.
EPSS
9 Critical
CVSS2
8.8 High
CVSS3