2 results (0.002 seconds)

CVSS: 9.0EPSS: 0%CPEs: 5EXPL: 0

sa-exim 4.2.1 allows attackers to execute arbitrary code if they can write a .cf file or a rule. This occurs because Greylisting.pm relies on eval (rather than direct parsing and/or use of the taint feature). This issue is similar to CVE-2018-11805. sa-exim versión 4.2.1, permite a atacantes ejecutar código arbitrario si pueden escribir un archivo .cf o una regla. Esto se presenta porque el archivo Greylisting.pm se basa en eval (en lugar de análisis directo y/o uso de la funcionalidad taint). Este problema es similar a CVE-2018-11805. • https://bugs.debian.org/946829#24 https://lists.debian.org/debian-lts-announce/2020/01/msg00006.html https://marc.info/?l=spamassassin-users&m=157668107325768&w=2 https://marc.info/?l=spamassassin-users&m=157668305026635&w=2 https://usn.ubuntu.com/4520-1 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVSS: 5.0EPSS: 1%CPEs: 3EXPL: 0

Argument injection vulnerability in greylistclean.cron in sa-exim 4.2 allows remote attackers to delete arbitrary files via an email with a To field that contains a filename separated by whitespace, which is not quoted when greylistclean.cron provides the argument to the rm command. • http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=345071 http://marc.merlins.org/linux/exim/files/sa-exim-cvs/Changelog.html http://secunia.com/advisories/19225 http://www.securityfocus.com/bid/17110 http://www.vupen.com/english/advisories/2006/0941 https://exchange.xforce.ibmcloud.com/vulnerabilities/25286 • CWE-94: Improper Control of Generation of Code ('Code Injection') •