Описание
Exim 4 before 4.94.2 allows Execution with Unnecessary Privileges. Because Exim operates as root in the spool directory (owned by a non-root user), an attacker can write to a /var/spool/exim4/input spool header file, in which a crafted recipient address can indirectly lead to command execution.
| Релиз | Статус | Примечание |
|---|---|---|
| bionic | released | 4.90.1-1ubuntu1.8 |
| devel | released | 4.94-15ubuntu1.2 |
| esm-infra-legacy/trusty | released | 4.82-3ubuntu2.4+esm3 |
| esm-infra/bionic | released | 4.90.1-1ubuntu1.8 |
| esm-infra/focal | released | 4.93-13ubuntu1.5 |
| esm-infra/xenial | released | 4.86.2-2ubuntu2.6+esm1 |
| focal | released | 4.93-13ubuntu1.5 |
| groovy | released | 4.94-7ubuntu1.2 |
| hirsute | released | 4.94-15ubuntu1.2 |
| impish | released | 4.94-15ubuntu1.2 |
Показывать по
7.2 High
CVSS2
7.8 High
CVSS3
Связанные уязвимости
Exim 4 before 4.94.2 allows Execution with Unnecessary Privileges. Because Exim operates as root in the spool directory (owned by a non-root user), an attacker can write to a /var/spool/exim4/input spool header file, in which a crafted recipient address can indirectly lead to command execution.
Exim 4 before 4.94.2 allows Execution with Unnecessary Privileges. Bec ...
Exim 4 before 4.94.2 allows Execution with Unnecessary Privileges. Because Exim operates as root in the spool directory (owned by a non-root user), an attacker can write to a /var/spool/exim4/input spool header file, in which a crafted recipient address can indirectly lead to command execution.
Уязвимость агента пересылки сообщений Exim, связанная с ошибками управления привилегиями, позволяющая нарушителю повысить привилегии в системе
7.2 High
CVSS2
7.8 High
CVSS3