9.7 High
AI Score
Confidence
High
9.3 High
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
0.931 High
EPSS
Percentile
99.0%
Sergey Kononenko and Eugene Bujak discovered that Exim did not correctly
truncate string expansions. A remote attacker could send specially crafted
email traffic to run arbitrary code as the Exim user, which could also
lead to root privileges.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Ubuntu | 9.10 | noarch | exim4-daemon-heavy | < 4.69-11ubuntu4.1 | UNKNOWN |
Ubuntu | 9.10 | noarch | exim4-base | < 4.69-11ubuntu4.1 | UNKNOWN |
Ubuntu | 9.10 | noarch | exim4-daemon-heavy-dbg | < 4.69-11ubuntu4.1 | UNKNOWN |
Ubuntu | 9.10 | noarch | exim4-daemon-light | < 4.69-11ubuntu4.1 | UNKNOWN |
Ubuntu | 9.10 | noarch | exim4-daemon-light-dbg | < 4.69-11ubuntu4.1 | UNKNOWN |
Ubuntu | 9.10 | noarch | exim4-dbg | < 4.69-11ubuntu4.1 | UNKNOWN |
Ubuntu | 9.10 | noarch | exim4-dev | < 4.69-11ubuntu4.1 | UNKNOWN |
Ubuntu | 9.10 | noarch | eximon4 | < 4.69-11ubuntu4.1 | UNKNOWN |
Ubuntu | 9.10 | noarch | exim4-daemon-custom | < 4.69-11ubuntu4.1 | UNKNOWN |
Ubuntu | 8.04 | noarch | exim4-daemon-heavy | < 4.69-2ubuntu0.2 | UNKNOWN |