CVE-2019-10149

Known exploited
Public exploit
A flaw was found in Exim versions 4.87 to 4.91 (inclusive). Improper validation of recipient address in deliver_message() function in /src/deliver.c may lead to remote command execution.
Max CVSS
10.0
EPSS Score
97.36%
Published
2019-06-05
Updated
2022-11-07
CISA KEV Added
2022-01-10
Exim 4.85 through 4.92 (fixed in 4.92.1) allows remote code execution as root in some unusual configurations that use the ${sort } expansion for items that can be controlled by an attacker (e.g., $local_part or $domain).
Max CVSS
10.0
EPSS Score
5.02%
Published
2019-07-25
Updated
2019-09-07
Exim before 4.92.2 allows remote attackers to execute arbitrary code as root via a trailing backslash.
Max CVSS
10.0
EPSS Score
19.65%
Published
2019-09-06
Updated
2020-08-24
The receive_msg function in receive.c in the SMTP daemon in Exim 4.88 and 4.89 allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free) via vectors involving BDAT commands.
Max CVSS
9.8
EPSS Score
52.70%
Published
2017-11-25
Updated
2021-05-04

CVE-2018-6789

Known exploited
Used for ransomware
An issue was discovered in the base64d function in the SMTP listener in Exim before 4.90.1. By sending a handcrafted message, a buffer overflow may happen. This can be used to execute code remotely.
Max CVSS
9.8
EPSS Score
96.76%
Published
2018-02-08
Updated
2021-06-03
CISA KEV Added
2021-11-03

CVE-2019-16928

Known exploited
Exim 4.92 through 4.92.2 allows remote code execution, a different vulnerability than CVE-2019-15846. There is a heap-based buffer overflow in string_vformat in string.c involving a long EHLO command.
Max CVSS
9.8
EPSS Score
91.47%
Published
2019-09-27
Updated
2022-03-31
CISA KEV Added
2022-03-03
Exim 4 before 4.94.2 allows Integer Overflow to Buffer Overflow in receive_add_recipient via an e-mail message with fifty million recipients. NOTE: remote exploitation may be difficult because of resource consumption.
Max CVSS
9.8
EPSS Score
0.25%
Published
2021-05-06
Updated
2022-10-04
Exim 4 before 4.94.2 allows Use After Free in smtp_reset in certain situations that may be common for builds with OpenSSL.
Max CVSS
9.8
EPSS Score
3.35%
Published
2021-05-06
Updated
2021-05-26
Exim 4 before 4.92 allows Integer Overflow to Buffer Overflow, in which an unauthenticated remote attacker can execute arbitrary code by leveraging the mishandling of continuation lines during header-length restriction.
Max CVSS
9.8
EPSS Score
2.96%
Published
2021-05-06
Updated
2022-06-28
Exim 4 before 4.94.2 has Improper Restriction of Write Operations within the Bounds of a Memory Buffer. This occurs when processing name=value pairs within MAIL FROM and RCPT TO commands.
Max CVSS
9.8
EPSS Score
0.22%
Published
2021-05-06
Updated
2022-06-28
Exim 4 before 4.94.2 allows Buffer Underwrite that may result in unauthenticated remote attackers executing arbitrary commands, because smtp_ungetc was only intended to push back characters, but can actually push back non-character error codes such as EOF.
Max CVSS
9.8
EPSS Score
0.51%
Published
2021-05-06
Updated
2022-06-28
Exim 4 before 4.94.2 has Improper Neutralization of Line Delimiters, relevant in non-default configurations that enable Delivery Status Notification (DSN). Certain uses of ORCPT= can place a newline into a spool header file, and indirectly allow unauthenticated remote attackers to execute arbitrary commands as root.
Max CVSS
9.8
EPSS Score
0.93%
Published
2021-05-06
Updated
2022-07-12
A vulnerability was found in Exim and classified as problematic. This issue affects the function dmarc_dns_lookup of the file dmarc.c of the component DMARC Handler. The manipulation leads to use after free. The attack may be initiated remotely. The name of the patch is 12fb3842f81bcbd4a4519d5728f2d7e0e3ca1445. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-211919.
Max CVSS
9.8
EPSS Score
0.26%
Published
2022-10-20
Updated
2023-01-20
Exim before 4.95 has a heap-based buffer overflow for the alias list in host_name_lookup in host.c when sender_host_name is set.
Max CVSS
9.8
EPSS Score
0.47%
Published
2022-08-07
Updated
2022-10-28

CVE-2010-4344

Known exploited
Public exploit
Heap-based buffer overflow in the string_vformat function in string.c in Exim before 4.70 allows remote attackers to execute arbitrary code via an SMTP session that includes two MAIL commands in conjunction with a large message containing crafted headers, leading to improper rejection logging.
Max CVSS
9.3
EPSS Score
93.07%
Published
2010-12-14
Updated
2023-02-13
CISA KEV Added
2022-03-25
Exim 4 before 4.94.2 has Improper Neutralization of Line Delimiters. An authenticated remote SMTP client can insert newline characters into a spool file (which indirectly leads to remote code execution as root) via AUTH= in a MAIL FROM command.
Max CVSS
9.0
EPSS Score
0.25%
Published
2021-05-06
Updated
2021-05-10
A UNIX Symbolic Link (Symlink) Following vulnerability in the packaging of exim in openSUSE Factory allows local attackers to escalate from user mail to root. This issue affects: openSUSE Factory exim versions prior to 4.93.0.4-3.1.
Max CVSS
8.4
EPSS Score
0.04%
Published
2020-04-02
Updated
2020-11-20
Exim 4 before 4.94.2 allows Execution with Unnecessary Privileges. Because Exim operates as root in the log directory (owned by a non-root user), a symlink or hard link attack allows overwriting critical root-owned files anywhere on the filesystem.
Max CVSS
7.8
EPSS Score
0.04%
Published
2021-05-06
Updated
2021-05-10
Exim 4 before 4.94.2 allows Execution with Unnecessary Privileges. Because Exim operates as root in the spool directory (owned by a non-root user), an attacker can write to a /var/spool/exim4/input spool header file, in which a crafted recipient address can indirectly lead to command execution.
Max CVSS
7.8
EPSS Score
0.04%
Published
2021-05-06
Updated
2021-05-10
Exim 4 before 4.94.2 allows Integer Overflow to Buffer Overflow because get_stdinput allows unbounded reads that are accompanied by unbounded increases in a certain size variable. NOTE: exploitation may be impractical because of the execution time needed to overflow (multiple days).
Max CVSS
7.8
EPSS Score
0.05%
Published
2021-05-06
Updated
2021-05-10
Exim 4 before 4.94.2 allows Out-of-bounds Write because the main function, while setuid root, copies the current working directory pathname into a buffer that is too small (on some common platforms).
Max CVSS
7.8
EPSS Score
0.04%
Published
2021-05-06
Updated
2021-12-03
Exim 4 before 4.94.2 allows Heap-based Buffer Overflow in queue_run via two sender options: -R and -S. This may cause privilege escalation from exim to root.
Max CVSS
7.8
EPSS Score
0.04%
Published
2021-05-06
Updated
2021-05-10
Exim 4 before 4.94.2 allows Exposure of File Descriptor to Unintended Control Sphere because rda_interpret uses a privileged pipe that lacks a close-on-exec flag.
Max CVSS
7.8
EPSS Score
0.04%
Published
2021-05-06
Updated
2022-07-12
Exim 4 before 4.94.2 allows Heap-based Buffer Overflow because it mishandles "-F '.('" on the command line, and thus may allow privilege escalation from any user to root. This occurs because of the interpretation of negative sizes in strncpy.
Max CVSS
7.8
EPSS Score
0.04%
Published
2021-05-06
Updated
2021-05-10
Exim 4 before 4.94.2 has Improper Neutralization of Line Delimiters. Local users can alter the behavior of root processes because a recipient address can have a newline character.
Max CVSS
7.8
EPSS Score
0.04%
Published
2021-05-06
Updated
2021-05-10
49 vulnerabilities found
1 2
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!