Page 7 of 38 results (0.011 seconds)

CVSS: 4.6EPSS: 0%CPEs: 52EXPL: 0

expand.c in Exim before 4.83 expands mathematical comparisons twice, which allows local users to gain privileges and execute arbitrary commands via a crafted lookup value. expand.c en Exim anterior a 4.83 expande las comparaciones matemáticas dos veces, lo que permite a usuarios locales ganar privilegios y ejecutar comandos arbitrarios a través de un valor lookup maniulado. • http://git.exim.org/exim.git/commitdiff/7685ce68148a083d7759e78d01aa5198fc099c44 http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136251.html http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136264.html http://www.ubuntu.com/usn/USN-2933-1 https://bugzilla.redhat.com/show_bug.cgi?id=1122552 https://lists.exim.org/lurker/message/20140722.145949.42c043f5.en.html https://lists.exim.org/lurker/message/20140722.152452.d6c019e8.en.html https://security.gentoo.org/gls • CWE-189: Numeric Errors •

CVSS: 6.8EPSS: 5%CPEs: 51EXPL: 0

The dmarc_process function in dmarc.c in Exim before 4.82.1, when EXPERIMENTAL_DMARC is enabled, allows remote attackers to execute arbitrary code via the From header in an email, which is passed to the expand_string function. La función dmarc_process en dmarc.c en Exim anterior a 4.82.1, cuando EXPERIMENTAL_DMARC está habilitado, permite a atacantes remotos ejecutar código arbitrario a través de la cabecera Desde en un email, lo cual es pasado a la función expand_string. • http://git.exim.org/exim.git/commitdiff/5b7a7c051c9ab9ee7c924a611f90ef2be03e0ad0 http://www.openwall.com/lists/oss-security/2021/05/04/7 https://lists.exim.org/lurker/message/20140528.122536.a31d60a4.en.html • CWE-20: Improper Input Validation •

CVSS: 7.5EPSS: 9%CPEs: 70EXPL: 0

Format string vulnerability in the dkim_exim_verify_finish function in src/dkim.c in Exim before 4.76 might allow remote attackers to execute arbitrary code or cause a denial of service (daemon crash) via format string specifiers in data used in DKIM logging, as demonstrated by an identity field containing a % (percent) character. Vulnerabilidad de formato de cadena en la función dkim_exim_verify_finish de src/dkim.c de Exim en versiones anteriores a 4.76. Puede permitir a atacantes remotos ejecutar código arbitrario o provocar una denegación de servicio (caída del demonio) a través de especificadores de formato de cadena en datos usados en el logging DKIM, tal como se ha demostrado en un campo identity que contenga un carácter % (tanto por ciento). • http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=624670 http://bugs.exim.org/show_bug.cgi?id=1106 http://git.exim.org/exim.git/commit/337e3505b0e6cd4309db6bf6062b33fa56e06cf8 http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00005.html http://secunia.com/advisories/51155 http://www.debian.org/security/2011/dsa-2232 https://bugzilla.redhat.com/show_bug.cgi?id=702474 • CWE-134: Use of Externally-Controlled Format String •

CVSS: 6.9EPSS: 0%CPEs: 67EXPL: 0

The open_log function in log.c in Exim 4.72 and earlier does not check the return value from (1) setuid or (2) setgid system calls, which allows local users to append log data to arbitrary files via a symlink attack. La función open_log en log.c de Exim v4.72 y anteriores no comprueba el valor devuelto por (1) setuid o (2) llamadas del sistema setgid, lo que permite a usuarios locales anexar los datos de registro a los archivos de su elección mediante un ataque de enlace simbólico. • ftp://ftp.exim.org/pub/exim/ChangeLogs/ChangeLog-4.74 http://lists.exim.org/lurker/message/20110126.034702.4d69c278.en.html http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00004.html http://osvdb.org/70696 http://secunia.com/advisories/43101 http://secunia.com/advisories/43128 http://secunia.com/advisories/43243 http://www.debian.org/security/2011/dsa-2154 http://www.securityfocus.com/bid/46065 http://www.ubuntu.com/usn/USN-1060-1 http://www.vupe • CWE-20: Improper Input Validation CWE-59: Improper Link Resolution Before File Access ('Link Following') •

CVSS: 6.9EPSS: 1%CPEs: 67EXPL: 1

Exim 4.72 and earlier allows local users to gain privileges by leveraging the ability of the exim user account to specify an alternate configuration file with a directive that contains arbitrary commands, as demonstrated by the spool_directory directive. Exim v4.72 y anteriores permiten a usuarios locales ganar privilegios potenciando la habilidad especificar un archivo de cuenta de usuario con una configuración alternativa mediante una directiva que contenga comandos de su elección, como se demostró con la directiva spool_directory. Exim allows local users to gain privileges by leveraging the ability of the exim user account to specify an alternate configuration file with a directive that contains arbitrary commands. • https://www.exploit-db.com/exploits/16925 http://bugs.exim.org/show_bug.cgi?id=1044 http://lists.exim.org/lurker/message/20101209.172233.abcba158.en.html http://lists.exim.org/lurker/message/20101210.164935.385e04d0.en.html http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00003.html http://openwall.com/lists/oss-security/2010/12/10/1 http://secunia.com/advisories/42576 http://secunia.com/advisories/42930 http://secunia.com/advisories/43128 http://secunia • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') CWE-264: Permissions, Privileges, and Access Controls •