Filtered by vendor Exim
Subscribe
Total
49 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2020-28008 | 1 Exim | 1 Exim | 2024-02-04 | 7.2 HIGH | 7.8 HIGH |
Exim 4 before 4.94.2 allows Execution with Unnecessary Privileges. Because Exim operates as root in the spool directory (owned by a non-root user), an attacker can write to a /var/spool/exim4/input spool header file, in which a crafted recipient address can indirectly lead to command execution. | |||||
CVE-2020-28012 | 1 Exim | 1 Exim | 2024-02-04 | 7.2 HIGH | 7.8 HIGH |
Exim 4 before 4.94.2 allows Exposure of File Descriptor to Unintended Control Sphere because rda_interpret uses a privileged pipe that lacks a close-on-exec flag. | |||||
CVE-2020-28011 | 1 Exim | 1 Exim | 2024-02-04 | 7.2 HIGH | 7.8 HIGH |
Exim 4 before 4.94.2 allows Heap-based Buffer Overflow in queue_run via two sender options: -R and -S. This may cause privilege escalation from exim to root. | |||||
CVE-2020-28025 | 1 Exim | 1 Exim | 2024-02-04 | 5.0 MEDIUM | 7.5 HIGH |
Exim 4 before 4.94.2 allows Out-of-bounds Read because pdkim_finish_bodyhash does not validate the relationship between sig->bodyhash.len and b->bh.len; thus, a crafted DKIM-Signature header might lead to a leak of sensitive information from process memory. | |||||
CVE-2020-28014 | 1 Exim | 1 Exim | 2024-02-04 | 5.6 MEDIUM | 6.1 MEDIUM |
Exim 4 before 4.94.2 allows Execution with Unnecessary Privileges. The -oP option is available to the exim user, and allows a denial of service because root-owned files can be overwritten. | |||||
CVE-2020-28007 | 1 Exim | 1 Exim | 2024-02-04 | 7.2 HIGH | 7.8 HIGH |
Exim 4 before 4.94.2 allows Execution with Unnecessary Privileges. Because Exim operates as root in the log directory (owned by a non-root user), a symlink or hard link attack allows overwriting critical root-owned files anywhere on the filesystem. | |||||
CVE-2021-38371 | 1 Exim | 1 Exim | 2024-02-04 | 5.0 MEDIUM | 7.5 HIGH |
The STARTTLS feature in Exim through 4.94.2 allows response injection (buffering) during MTA SMTP sending. | |||||
CVE-2020-28021 | 1 Exim | 1 Exim | 2024-02-04 | 9.0 HIGH | 8.8 HIGH |
Exim 4 before 4.94.2 has Improper Neutralization of Line Delimiters. An authenticated remote SMTP client can insert newline characters into a spool file (which indirectly leads to remote code execution as root) via AUTH= in a MAIL FROM command. | |||||
CVE-2020-28024 | 1 Exim | 1 Exim | 2024-02-04 | 7.5 HIGH | 9.8 CRITICAL |
Exim 4 before 4.94.2 allows Buffer Underwrite that may result in unauthenticated remote attackers executing arbitrary commands, because smtp_ungetc was only intended to push back characters, but can actually push back non-character error codes such as EOF. | |||||
CVE-2020-28016 | 1 Exim | 1 Exim | 2024-02-04 | 7.2 HIGH | 7.8 HIGH |
Exim 4 before 4.94.2 allows an off-by-two Out-of-bounds Write because "-F ''" is mishandled by parse_fix_phrase. | |||||
CVE-2020-8015 | 2 Exim, Opensuse | 2 Exim, Opensuse | 2024-02-04 | 7.2 HIGH | 7.8 HIGH |
A UNIX Symbolic Link (Symlink) Following vulnerability in the packaging of exim in openSUSE Factory allows local attackers to escalate from user mail to root. This issue affects: openSUSE Factory exim versions prior to 4.93.0.4-3.1. | |||||
CVE-2020-12783 | 1 Exim | 1 Exim | 2024-02-04 | 5.0 MEDIUM | 7.5 HIGH |
Exim through 4.93 has an out-of-bounds read in the SPA authenticator that could result in SPA/NTLM authentication bypass in auths/spa.c and auths/auth-spa.c. | |||||
CVE-2019-13917 | 2 Debian, Exim | 2 Debian Linux, Exim | 2024-02-04 | 10.0 HIGH | 9.8 CRITICAL |
Exim 4.85 through 4.92 (fixed in 4.92.1) allows remote code execution as root in some unusual configurations that use the ${sort } expansion for items that can be controlled by an attacker (e.g., $local_part or $domain). | |||||
CVE-2019-15846 | 2 Debian, Exim | 2 Debian Linux, Exim | 2024-02-04 | 10.0 HIGH | 9.8 CRITICAL |
Exim before 4.92.2 allows remote attackers to execute arbitrary code as root via a trailing backslash. | |||||
CVE-2019-10149 | 3 Canonical, Debian, Exim | 3 Ubuntu Linux, Debian Linux, Exim | 2024-02-04 | 10.0 HIGH | 9.8 CRITICAL |
A flaw was found in Exim versions 4.87 to 4.91 (inclusive). Improper validation of recipient address in deliver_message() function in /src/deliver.c may lead to remote command execution. | |||||
CVE-2017-1000369 | 2 Debian, Exim | 2 Debian Linux, Exim | 2024-02-04 | 2.1 LOW | 4.0 MEDIUM |
Exim supports the use of multiple "-p" command line arguments which are malloc()'ed and never free()'ed, used in conjunction with other issues allows attackers to cause arbitrary code execution. This affects exim version 4.89 and earlier. Please note that at this time upstream has released a patch (commit 65e061b76867a9ea7aeeb535341b790b90ae6c21), but it is not known if a new point release is available that addresses this issue at this time. | |||||
CVE-2017-16943 | 2 Debian, Exim | 2 Debian Linux, Exim | 2024-02-04 | 7.5 HIGH | 9.8 CRITICAL |
The receive_msg function in receive.c in the SMTP daemon in Exim 4.88 and 4.89 allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free) via vectors involving BDAT commands. | |||||
CVE-2017-16944 | 2 Debian, Exim | 2 Debian Linux, Exim | 2024-02-04 | 5.0 MEDIUM | 7.5 HIGH |
The receive_msg function in receive.c in the SMTP daemon in Exim 4.88 and 4.89 allows remote attackers to cause a denial of service (infinite loop and stack exhaustion) via vectors involving BDAT commands and an improper check for a '.' character signifying the end of the content, related to the bdat_getc function. | |||||
CVE-2016-9963 | 3 Canonical, Debian, Exim | 3 Ubuntu Linux, Debian Linux, Exim | 2024-02-04 | 2.6 LOW | 5.9 MEDIUM |
Exim before 4.87.1 might allow remote attackers to obtain the private DKIM signing key via vectors related to log files and bounce messages. | |||||
CVE-2016-1531 | 1 Exim | 1 Exim | 2024-02-04 | 6.9 MEDIUM | 7.0 HIGH |
Exim before 4.86.2, when installed setuid root, allows local users to gain privileges via the perl_startup argument. |