Описание
Exim 4 before 4.94.2 allows Execution with Unnecessary Privileges. Because Exim operates as root in the log directory (owned by a non-root user), a symlink or hard link attack allows overwriting critical root-owned files anywhere on the filesystem.
| Релиз | Статус | Примечание |
|---|---|---|
| bionic | released | 4.90.1-1ubuntu1.8 |
| devel | released | 4.94-15ubuntu1.2 |
| esm-infra-legacy/trusty | released | 4.82-3ubuntu2.4+esm3 |
| esm-infra/bionic | released | 4.90.1-1ubuntu1.8 |
| esm-infra/focal | released | 4.93-13ubuntu1.5 |
| esm-infra/xenial | released | 4.86.2-2ubuntu2.6+esm1 |
| focal | released | 4.93-13ubuntu1.5 |
| groovy | released | 4.94-7ubuntu1.2 |
| hirsute | released | 4.94-15ubuntu1.2 |
| impish | released | 4.94-15ubuntu1.2 |
Показывать по
7.2 High
CVSS2
7.8 High
CVSS3
Связанные уязвимости
Exim 4 before 4.94.2 allows Execution with Unnecessary Privileges. Because Exim operates as root in the log directory (owned by a non-root user), a symlink or hard link attack allows overwriting critical root-owned files anywhere on the filesystem.
Exim 4 before 4.94.2 allows Execution with Unnecessary Privileges. Bec ...
Exim 4 before 4.94.2 allows Execution with Unnecessary Privileges. Because Exim operates as root in the log directory (owned by a non-root user), a symlink or hard link attack allows overwriting critical root-owned files anywhere on the filesystem.
Уязвимость агента пересылки сообщений Exim, связанная с отслеживаниеи символьных ссылок, позволяющая нарушителю повысить привилегии в системе
Уязвимость агента пересылки сообщений Exim, связанная с ошибками управления привилегиями, позволяющая нарушителю удалять произвольные файлы в системе
7.2 High
CVSS2
7.8 High
CVSS3