CVE-2020-28011
- EPSS 0.2%
- Veröffentlicht 06.05.2021 13:15:09
- Zuletzt bearbeitet 21.11.2024 05:22:11
Exim 4 before 4.94.2 allows Heap-based Buffer Overflow in queue_run via two sender options: -R and -S. This may cause privilege escalation from exim to root.
CVE-2020-28010
- EPSS 0.16%
- Veröffentlicht 06.05.2021 13:15:09
- Zuletzt bearbeitet 21.11.2024 05:22:11
Exim 4 before 4.94.2 allows Out-of-bounds Write because the main function, while setuid root, copies the current working directory pathname into a buffer that is too small (on some common platforms).
CVE-2020-28009
- EPSS 0.24%
- Veröffentlicht 06.05.2021 13:15:09
- Zuletzt bearbeitet 21.11.2024 05:22:11
Exim 4 before 4.94.2 allows Integer Overflow to Buffer Overflow because get_stdinput allows unbounded reads that are accompanied by unbounded increases in a certain size variable. NOTE: exploitation may be impractical because of the execution time ne...
CVE-2020-28008
- EPSS 0.15%
- Veröffentlicht 06.05.2021 13:15:09
- Zuletzt bearbeitet 21.11.2024 05:22:11
Exim 4 before 4.94.2 allows Execution with Unnecessary Privileges. Because Exim operates as root in the spool directory (owned by a non-root user), an attacker can write to a /var/spool/exim4/input spool header file, in which a crafted recipient addr...
CVE-2020-28007
- EPSS 0.23%
- Veröffentlicht 06.05.2021 13:15:09
- Zuletzt bearbeitet 21.11.2024 05:22:11
Exim 4 before 4.94.2 allows Execution with Unnecessary Privileges. Because Exim operates as root in the log directory (owned by a non-root user), a symlink or hard link attack allows overwriting critical root-owned files anywhere on the filesystem.
CVE-2020-12783
- EPSS 1.45%
- Veröffentlicht 11.05.2020 14:15:11
- Zuletzt bearbeitet 21.11.2024 05:00:17
Exim through 4.93 has an out-of-bounds read in the SPA authenticator that could result in SPA/NTLM authentication bypass in auths/spa.c and auths/auth-spa.c.
CVE-2020-8015
- EPSS 0.14%
- Veröffentlicht 02.04.2020 08:15:21
- Zuletzt bearbeitet 21.11.2024 05:38:13
A UNIX Symbolic Link (Symlink) Following vulnerability in the packaging of exim in openSUSE Factory allows local attackers to escalate from user mail to root. This issue affects: openSUSE Factory exim versions prior to 4.93.0.4-3.1.
CVE-2019-16928
- EPSS 90.4%
- Veröffentlicht 27.09.2019 21:15:10
- Zuletzt bearbeitet 07.11.2025 19:37:28
Exim 4.92 through 4.92.2 allows remote code execution, a different vulnerability than CVE-2019-15846. There is a heap-based buffer overflow in string_vformat in string.c involving a long EHLO command.
- EPSS 65.08%
- Veröffentlicht 06.09.2019 11:15:11
- Zuletzt bearbeitet 21.11.2024 04:29:36
Exim before 4.92.2 allows remote attackers to execute arbitrary code as root via a trailing backslash.
- EPSS 18.89%
- Veröffentlicht 25.07.2019 20:15:11
- Zuletzt bearbeitet 21.11.2024 04:25:41
Exim 4.85 through 4.92 (fixed in 4.92.1) allows remote code execution as root in some unusual configurations that use the ${sort } expansion for items that can be controlled by an attacker (e.g., $local_part or $domain).