Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2020-28026

Опубликовано: 06 мая 2021
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 9.3
CVSS3: 9.8

Описание

Exim 4 before 4.94.2 has Improper Neutralization of Line Delimiters, relevant in non-default configurations that enable Delivery Status Notification (DSN). Certain uses of ORCPT= can place a newline into a spool header file, and indirectly allow unauthenticated remote attackers to execute arbitrary commands as root.

РелизСтатусПримечание
bionic

released

4.90.1-1ubuntu1.8
devel

released

4.94-15ubuntu1.2
esm-infra-legacy/trusty

released

4.82-3ubuntu2.4+esm3
esm-infra/bionic

released

4.90.1-1ubuntu1.8
esm-infra/focal

released

4.93-13ubuntu1.5
esm-infra/xenial

released

4.86.2-2ubuntu2.6+esm1
focal

released

4.93-13ubuntu1.5
groovy

released

4.94-7ubuntu1.2
hirsute

released

4.94-15ubuntu1.2
impish

released

4.94-15ubuntu1.2

Показывать по

EPSS

Процентиль: 88%
0.03964
Низкий

9.3 Critical

CVSS2

9.8 Critical

CVSS3

Связанные уязвимости

CVSS3: 9.8
nvd
почти 5 лет назад

Exim 4 before 4.94.2 has Improper Neutralization of Line Delimiters, relevant in non-default configurations that enable Delivery Status Notification (DSN). Certain uses of ORCPT= can place a newline into a spool header file, and indirectly allow unauthenticated remote attackers to execute arbitrary commands as root.

CVSS3: 9.8
debian
почти 5 лет назад

Exim 4 before 4.94.2 has Improper Neutralization of Line Delimiters, r ...

CVSS3: 9.8
github
больше 3 лет назад

Exim 4 before 4.94.2 has Improper Neutralization of Line Delimiters, relevant in non-default configurations that enable Delivery Status Notification (DSN). Certain uses of ORCPT= can place a newline into a spool header file, and indirectly allow unauthenticated remote attackers to execute arbitrary commands as root.

fstec
больше 5 лет назад

Уязвимость функции spool_read_header() агента пересылки сообщений Exim, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю обойти ограничения безопасности

suse-cvrf
почти 5 лет назад

Security update for exim

EPSS

Процентиль: 88%
0.03964
Низкий

9.3 Critical

CVSS2

9.8 Critical

CVSS3