Exim

Exim

63 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.18%
  • Veröffentlicht 06.05.2021 13:15:09
  • Zuletzt bearbeitet 21.11.2024 05:22:11

Exim 4 before 4.94.2 allows Execution with Unnecessary Privileges. Because Exim operates as root in the log directory (owned by a non-root user), a symlink or hard link attack allows overwriting critical root-owned files anywhere on the filesystem.

Exploit
  • EPSS 3.19%
  • Veröffentlicht 11.05.2020 14:15:11
  • Zuletzt bearbeitet 21.11.2024 05:00:17

Exim through 4.93 has an out-of-bounds read in the SPA authenticator that could result in SPA/NTLM authentication bypass in auths/spa.c and auths/auth-spa.c.

Exploit
  • EPSS 0.12%
  • Veröffentlicht 02.04.2020 08:15:21
  • Zuletzt bearbeitet 21.11.2024 05:38:13

A UNIX Symbolic Link (Symlink) Following vulnerability in the packaging of exim in openSUSE Factory allows local attackers to escalate from user mail to root. This issue affects: openSUSE Factory exim versions prior to 4.93.0.4-3.1.

Warnung Exploit
  • EPSS 90.39%
  • Veröffentlicht 27.09.2019 21:15:10
  • Zuletzt bearbeitet 07.11.2025 19:37:28

Exim 4.92 through 4.92.2 allows remote code execution, a different vulnerability than CVE-2019-15846. There is a heap-based buffer overflow in string_vformat in string.c involving a long EHLO command.

  • EPSS 65.45%
  • Veröffentlicht 06.09.2019 11:15:11
  • Zuletzt bearbeitet 21.11.2024 04:29:36

Exim before 4.92.2 allows remote attackers to execute arbitrary code as root via a trailing backslash.

  • EPSS 19.57%
  • Veröffentlicht 25.07.2019 20:15:11
  • Zuletzt bearbeitet 21.11.2024 04:25:41

Exim 4.85 through 4.92 (fixed in 4.92.1) allows remote code execution as root in some unusual configurations that use the ${sort } expansion for items that can be controlled by an attacker (e.g., $local_part or $domain).

Warnung Exploit
  • EPSS 93.92%
  • Veröffentlicht 05.06.2019 14:29:11
  • Zuletzt bearbeitet 06.11.2025 14:49:48

A flaw was found in Exim versions 4.87 to 4.91 (inclusive). Improper validation of recipient address in deliver_message() function in /src/deliver.c may lead to remote command execution.

Warnung Exploit
  • EPSS 86.44%
  • Veröffentlicht 08.02.2018 23:29:01
  • Zuletzt bearbeitet 07.11.2025 19:04:28

An issue was discovered in the base64d function in the SMTP listener in Exim before 4.90.1. By sending a handcrafted message, a buffer overflow may happen. This can be used to execute code remotely.

Exploit
  • EPSS 77.43%
  • Veröffentlicht 25.11.2017 17:29:00
  • Zuletzt bearbeitet 13.05.2026 00:24:29

The receive_msg function in receive.c in the SMTP daemon in Exim 4.88 and 4.89 allows remote attackers to cause a denial of service (infinite loop and stack exhaustion) via vectors involving BDAT commands and an improper check for a '.' character sig...

Medienbericht Exploit
  • EPSS 76.93%
  • Veröffentlicht 25.11.2017 17:29:00
  • Zuletzt bearbeitet 13.05.2026 00:24:29

The receive_msg function in receive.c in the SMTP daemon in Exim 4.88 and 4.89 allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free) via vectors involving BDAT commands.