Vulnerability Details : CVE-2017-1000369
Exim supports the use of multiple "-p" command line arguments which are malloc()'ed and never free()'ed, used in conjunction with other issues allows attackers to cause arbitrary code execution. This affects exim version 4.89 and earlier. Please note that at this time upstream has released a patch (commit 65e061b76867a9ea7aeeb535341b790b90ae6c21), but it is not known if a new point release is available that addresses this issue at this time.
Products affected by CVE-2017-1000369
- cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
- cpe:2.3:a:exim:exim:*:*:*:*:*:*:*:*
- cpe:2.3:a:exim:exim:4.88:-:*:*:*:*:*:*
- cpe:2.3:a:exim:exim:4.88:rc1:*:*:*:*:*:*
- cpe:2.3:a:exim:exim:4.88:rc2:*:*:*:*:*:*
- cpe:2.3:a:exim:exim:4.88:rc3:*:*:*:*:*:*
- cpe:2.3:a:exim:exim:4.88:rc4:*:*:*:*:*:*
- cpe:2.3:a:exim:exim:4.88:rc5:*:*:*:*:*:*
- cpe:2.3:a:exim:exim:4.88:rc6:*:*:*:*:*:*
- cpe:2.3:a:exim:exim:4.89:-:*:*:*:*:*:*
- cpe:2.3:a:exim:exim:4.89:rc1:*:*:*:*:*:*
- cpe:2.3:a:exim:exim:4.89:rc2:*:*:*:*:*:*
- cpe:2.3:a:exim:exim:4.89:rc3:*:*:*:*:*:*
- cpe:2.3:a:exim:exim:4.89:rc4:*:*:*:*:*:*
- cpe:2.3:a:exim:exim:4.89:rc5:*:*:*:*:*:*
- cpe:2.3:a:exim:exim:4.89:rc6:*:*:*:*:*:*
- cpe:2.3:a:exim:exim:4.89:rc7:*:*:*:*:*:*
Threat overview for CVE-2017-1000369
Top countries where our scanners detected CVE-2017-1000369
Top open port discovered on systems with this issue
80
IPs affected by CVE-2017-1000369 22,124
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2017-1000369!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2017-1000369
0.29%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 68 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2017-1000369
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
2.1
|
LOW | AV:L/AC:L/Au:N/C:N/I:P/A:N |
3.9
|
2.9
|
NIST | |
4.0
|
MEDIUM | CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N |
2.5
|
1.4
|
NIST |
CWE ids for CVE-2017-1000369
-
The product does not release or incorrectly releases a resource before it is made available for re-use.Assigned by: nvd@nist.gov (Primary)
References for CVE-2017-1000369
-
http://www.debian.org/security/2017/dsa-3888
Debian -- Security Information -- DSA-3888-1 exim4Third Party Advisory
-
https://access.redhat.com/security/cve/CVE-2017-1000369
CVE-2017-1000369 - Red Hat Customer PortalVendor Advisory
-
http://www.securitytracker.com/id/1038779
Exim Memory Leak Lets Local Users Gain Elevated Privileges in Certain Cases - SecurityTrackerThird Party Advisory;VDB Entry
-
https://security.gentoo.org/glsa/201709-19
Exim: Local privilege escalation (GLSA 201709-19) — Gentoo securityThird Party Advisory
-
https://github.com/Exim/exim/commit/65e061b76867a9ea7aeeb535341b790b90ae6c21
Cleanup (prevent repeated use of -p/-oMr to avoid mem leak) · Exim/exim@65e061b · GitHubMitigation;Third Party Advisory
-
https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt
Third Party Advisory
-
http://www.securityfocus.com/bid/99252
Exim CVE-2017-1000369 Local Privilege Escalation VulnerabilityThird Party Advisory;VDB Entry
Jump to