Exim 4.86 Release Candidate 3

CPE Details

Exim 4.86 Release Candidate 3
4.86
2019-07-26 10:38 +00:00
2019-07-26 10:38 +00:00

Alerte pour un CPE

Stay informed of any changes for a specific CPE.
Alert management

CPE Name: cpe:2.3:a:exim:exim:4.86:rc3:*:*:*:*:*:*

Informations

Vendor

exim

Product

exim

Version

4.86

Update

rc3

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2023-51766 2023-12-23 23:00 +00:00 Exim before 4.97.1 allows SMTP smuggling in certain PIPELINING/CHUNKING configurations. Remote attackers can use a published exploitation technique to inject e-mail messages with a spoofed MAIL FROM address, allowing bypass of an SPF protection mechanism. This occurs because Exim supports . but some other popular e-mail servers do not.
5.3
MEDIUM
CVE-2022-37452 2022-08-07 15:06 +00:00 Exim before 4.95 has a heap-based buffer overflow for the alias list in host_name_lookup in host.c when sender_host_name is set.
9.8
CRITICAL
CVE-2022-37451 2022-08-06 15:02 +00:00 Exim before 4.96 has an invalid free in pam_converse in auths/call_pam.c because store_free is not used after store_malloc.
7.5
HIGH
CVE-2021-38371 2021-08-10 12:06 +00:00 The STARTTLS feature in Exim through 4.94.2 allows response injection (buffering) during MTA SMTP sending.
7.5
HIGH
CVE-2021-27216 2021-05-06 02:44 +00:00 Exim 4 before 4.94.2 has Execution with Unnecessary Privileges. By leveraging a delete_pid_file race condition, a local user can delete arbitrary files as root. This involves the -oP and -oPX options.
6.3
MEDIUM
CVE-2020-28026 2021-05-06 02:41 +00:00 Exim 4 before 4.94.2 has Improper Neutralization of Line Delimiters, relevant in non-default configurations that enable Delivery Status Notification (DSN). Certain uses of ORCPT= can place a newline into a spool header file, and indirectly allow unauthenticated remote attackers to execute arbitrary commands as root.
9.8
CRITICAL
CVE-2020-28025 2021-05-06 02:36 +00:00 Exim 4 before 4.94.2 allows Out-of-bounds Read because pdkim_finish_bodyhash does not validate the relationship between sig->bodyhash.len and b->bh.len; thus, a crafted DKIM-Signature header might lead to a leak of sensitive information from process memory.
7.5
HIGH
CVE-2020-28024 2021-05-06 02:31 +00:00 Exim 4 before 4.94.2 allows Buffer Underwrite that may result in unauthenticated remote attackers executing arbitrary commands, because smtp_ungetc was only intended to push back characters, but can actually push back non-character error codes such as EOF.
9.8
CRITICAL
CVE-2020-28023 2021-05-06 02:24 +00:00 Exim 4 before 4.94.2 allows Out-of-bounds Read. smtp_setup_msg may disclose sensitive information from process memory to an unauthenticated SMTP client.
7.5
HIGH
CVE-2020-28022 2021-05-06 02:20 +00:00 Exim 4 before 4.94.2 has Improper Restriction of Write Operations within the Bounds of a Memory Buffer. This occurs when processing name=value pairs within MAIL FROM and RCPT TO commands.
9.8
CRITICAL
CVE-2020-28021 2021-05-06 02:16 +00:00 Exim 4 before 4.94.2 has Improper Neutralization of Line Delimiters. An authenticated remote SMTP client can insert newline characters into a spool file (which indirectly leads to remote code execution as root) via AUTH= in a MAIL FROM command.
8.8
HIGH
CVE-2020-28020 2021-05-06 02:10 +00:00 Exim 4 before 4.92 allows Integer Overflow to Buffer Overflow, in which an unauthenticated remote attacker can execute arbitrary code by leveraging the mishandling of continuation lines during header-length restriction.
9.8
CRITICAL
CVE-2020-28017 2021-05-06 01:55 +00:00 Exim 4 before 4.94.2 allows Integer Overflow to Buffer Overflow in receive_add_recipient via an e-mail message with fifty million recipients. NOTE: remote exploitation may be difficult because of resource consumption.
9.8
CRITICAL
CVE-2020-28016 2021-05-06 01:51 +00:00 Exim 4 before 4.94.2 allows an off-by-two Out-of-bounds Write because "-F ''" is mishandled by parse_fix_phrase.
7.8
HIGH
CVE-2020-28015 2021-05-06 01:46 +00:00 Exim 4 before 4.94.2 has Improper Neutralization of Line Delimiters. Local users can alter the behavior of root processes because a recipient address can have a newline character.
7.8
HIGH
CVE-2020-28014 2021-05-06 01:43 +00:00 Exim 4 before 4.94.2 allows Execution with Unnecessary Privileges. The -oP option is available to the exim user, and allows a denial of service because root-owned files can be overwritten.
6.1
MEDIUM
CVE-2020-28013 2021-05-06 01:39 +00:00 Exim 4 before 4.94.2 allows Heap-based Buffer Overflow because it mishandles "-F '.('" on the command line, and thus may allow privilege escalation from any user to root. This occurs because of the interpretation of negative sizes in strncpy.
7.8
HIGH
CVE-2020-28012 2021-05-06 01:33 +00:00 Exim 4 before 4.94.2 allows Exposure of File Descriptor to Unintended Control Sphere because rda_interpret uses a privileged pipe that lacks a close-on-exec flag.
7.8
HIGH
CVE-2020-28011 2021-05-06 01:22 +00:00 Exim 4 before 4.94.2 allows Heap-based Buffer Overflow in queue_run via two sender options: -R and -S. This may cause privilege escalation from exim to root.
7.8
HIGH
CVE-2020-28010 2021-05-06 01:17 +00:00 Exim 4 before 4.94.2 allows Out-of-bounds Write because the main function, while setuid root, copies the current working directory pathname into a buffer that is too small (on some common platforms).
7.8
HIGH
CVE-2020-28009 2021-05-06 01:13 +00:00 Exim 4 before 4.94.2 allows Integer Overflow to Buffer Overflow because get_stdinput allows unbounded reads that are accompanied by unbounded increases in a certain size variable. NOTE: exploitation may be impractical because of the execution time needed to overflow (multiple days).
7.8
HIGH
CVE-2020-28008 2021-05-06 01:07 +00:00 Exim 4 before 4.94.2 allows Execution with Unnecessary Privileges. Because Exim operates as root in the spool directory (owned by a non-root user), an attacker can write to a /var/spool/exim4/input spool header file, in which a crafted recipient address can indirectly lead to command execution.
7.8
HIGH
CVE-2020-28007 2021-05-06 00:58 +00:00 Exim 4 before 4.94.2 allows Execution with Unnecessary Privileges. Because Exim operates as root in the log directory (owned by a non-root user), a symlink or hard link attack allows overwriting critical root-owned files anywhere on the filesystem.
7.8
HIGH
CVE-2020-12783 2020-05-11 11:51 +00:00 Exim through 4.93 has an out-of-bounds read in the SPA authenticator that could result in SPA/NTLM authentication bypass in auths/spa.c and auths/auth-spa.c.
7.5
HIGH
CVE-2020-8015 2020-04-01 22:00 +00:00 A UNIX Symbolic Link (Symlink) Following vulnerability in the packaging of exim in openSUSE Factory allows local attackers to escalate from user mail to root. This issue affects: openSUSE Factory exim versions prior to 4.93.0.4-3.1.
8.4
HIGH
CVE-2019-15846 2019-09-06 08:15 +00:00 Exim before 4.92.2 allows remote attackers to execute arbitrary code as root via a trailing backslash.
9.8
CRITICAL
CVE-2019-13917 2019-07-25 17:07 +00:00 Exim 4.85 through 4.92 (fixed in 4.92.1) allows remote code execution as root in some unusual configurations that use the ${sort } expansion for items that can be controlled by an attacker (e.g., $local_part or $domain).
9.8
CRITICAL
CVE-2018-6789 2018-02-08 22:00 +00:00 An issue was discovered in the base64d function in the SMTP listener in Exim before 4.90.1. By sending a handcrafted message, a buffer overflow may happen. This can be used to execute code remotely.
9.8
CRITICAL
CVE-2017-1000369 2017-06-19 14:00 +00:00 Exim supports the use of multiple "-p" command line arguments which are malloc()'ed and never free()'ed, used in conjunction with other issues allows attackers to cause arbitrary code execution. This affects exim version 4.89 and earlier. Please note that at this time upstream has released a patch (commit 65e061b76867a9ea7aeeb535341b790b90ae6c21), but it is not known if a new point release is available that addresses this issue at this time.
4
MEDIUM
CVE-2016-9963 2017-02-01 14:00 +00:00 Exim before 4.87.1 might allow remote attackers to obtain the private DKIM signing key via vectors related to log files and bounce messages.
5.9
MEDIUM
CVE-2016-1531 2016-04-07 21:00 +00:00 Exim before 4.86.2, when installed setuid root, allows local users to gain privileges via the perl_startup argument.
7
HIGH
Click on the button to the left (OFF), to authorize the inscription of cookie improving the functionalities of the site. Click on the button to the left (Accept all), to unauthorize the inscription of cookie improving the functionalities of the site.