9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
Debian Security Advisory DSA-4488-1 [email protected]
https://www.debian.org/security/ Salvatore Bonaccorso
July 25, 2019 https://www.debian.org/security/faq
Package : exim4
CVE ID : CVE-2019-13917
Jeremy Harris discovered that Exim, a mail transport agent, does not
properly handle the ${sort } expansion. This flaw can be exploited by a
remote attacker to execute programs with root privileges in non-default
(and unusual) configurations where ${sort } expansion is used for items
that can be controlled by an attacker.
For the oldstable distribution (stretch), this problem has been fixed
in version 4.89-2+deb9u5.
For the stable distribution (buster), this problem has been fixed in
version 4.92-8+deb10u1.
We recommend that you upgrade your exim4 packages.
For the detailed security status of exim4 please refer to its security
tracker page at:
https://security-tracker.debian.org/tracker/exim4
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: [email protected]
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Debian | 10 | armel | exim4-daemon-heavy-dbgsym | < 4.92-8+deb10u1 | exim4-daemon-heavy-dbgsym_4.92-8+deb10u1_armel.deb |
Debian | 10 | arm64 | exim4-base-dbgsym | < 4.92-8+deb10u1 | exim4-base-dbgsym_4.92-8+deb10u1_arm64.deb |
Debian | 9 | arm64 | exim4-dbg | < 4.89-2+deb9u5 | exim4-dbg_4.89-2+deb9u5_arm64.deb |
Debian | 9 | ppc64el | exim4-daemon-heavy | < 4.89-2+deb9u5 | exim4-daemon-heavy_4.89-2+deb9u5_ppc64el.deb |
Debian | 10 | s390x | exim4-daemon-light-dbgsym | < 4.92-8+deb10u1 | exim4-daemon-light-dbgsym_4.92-8+deb10u1_s390x.deb |
Debian | 10 | arm64 | exim4-daemon-heavy | < 4.92-8+deb10u1 | exim4-daemon-heavy_4.92-8+deb10u1_arm64.deb |
Debian | 9 | s390x | exim4-daemon-heavy-dbg | < 4.89-2+deb9u5 | exim4-daemon-heavy-dbg_4.89-2+deb9u5_s390x.deb |
Debian | 10 | mips64el | exim4-daemon-light | < 4.92-8+deb10u1 | exim4-daemon-light_4.92-8+deb10u1_mips64el.deb |
Debian | 9 | mips | exim4-daemon-heavy-dbg | < 4.89-2+deb9u5 | exim4-daemon-heavy-dbg_4.89-2+deb9u5_mips.deb |
Debian | 9 | amd64 | eximon4 | < 4.89-2+deb9u5 | eximon4_4.89-2+deb9u5_amd64.deb |
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C