// For flags

CVE-2019-10149

Exim Mail Transfer Agent (MTA) Improper Input Validation

Severity Score

9.8
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

26
*Multiple Sources

Exploited in Wild

Yes
*KEV

Decision

Act
*SSVC
Descriptions

A flaw was found in Exim versions 4.87 to 4.91 (inclusive). Improper validation of recipient address in deliver_message() function in /src/deliver.c may lead to remote command execution.

Se descubrió un defecto Exim versiones 4.87 a la 4.91 (incluida). Una validación incorrecta de la dirección del recipiente en la función deliver_message() en /src/deliver.c puede llevar a ejecutar comandos remotos

The Qualys Research Labs reported a flaw in Exim, a mail transport agent. Improper validation of the recipient address in the deliver_message() function may result in the execution of arbitrary commands.

Improper validation of recipient address in deliver_message() function in /src/deliver.c may lead to remote command execution.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
High
Privileges Required
None
User Interaction
None
Scope
Changed
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Complete
Integrity
Complete
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:Act
Exploitation
Active
Automatable
No
Tech. Impact
Total
* Organization's Worst-case Scenario
Timeline
  • 2019-03-27 CVE Reserved
  • 2019-06-05 CVE Published
  • 2019-06-05 First Exploit
  • 2022-01-10 Exploited in Wild
  • 2022-07-10 KEV Due Date
  • 2025-02-07 CVE Updated
  • 2025-03-18 EPSS Updated
CWE
  • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CAPEC
References (41)
URL Date SRC
https://packetstorm.news/files/id/154198 2019-08-23
https://packetstorm.news/files/id/153312 2019-06-17
https://www.exploit-db.com/exploits/46996 2019-06-17
https://www.exploit-db.com/exploits/47307 2019-08-26
https://www.exploit-db.com/exploits/46974 2019-06-05
https://github.com/cowbe0x004/eximrce-CVE-2019-10149 2019-07-08
https://github.com/Diefunction/CVE-2019-10149 2021-06-04
https://github.com/AzizMea/CVE-2019-10149-privilege-escalation 2019-06-27
https://github.com/darsigovrustam/CVE-2019-10149 2019-10-24
https://github.com/aishee/CVE-2019-10149-quick 2019-06-14
https://github.com/hyim0810/CVE-2019-10149 2023-10-25
https://github.com/Stick-U235/CVE-2019-10149-Exploit 2021-07-29
https://github.com/Dilshan-Eranda/CVE-2019-10149 2020-05-12
https://github.com/rahmadsandy/EXIM-4.87-CVE-2019-10149 2023-03-07
https://github.com/bananaphones/exim-rce-quickfix 2024-08-12
https://github.com/MNEMO-CERT/PoC--CVE-2019-10149_Exim 2024-08-12
https://github.com/Brets0150/StickyExim 2024-08-12
https://github.com/Chris-dev1/exim.exp 2024-08-12
https://github.com/cloudflare/exim-cve-2019-10149-data 2024-09-20
https://github.com/qlusec/CVE-2019-10149 2024-09-06
https://github.com/uyerr/PoC_CVE-2019-10149--rce 2024-11-24
http://packetstormsecurity.com/files/153218/Exim-4.9.1-Remote-Command-Execution.html 2025-02-07
http://packetstormsecurity.com/files/153312/Exim-4.91-Local-Privilege-Escalation.html 2025-02-07
http://packetstormsecurity.com/files/154198/Exim-4.91-Local-Privilege-Escalation.html 2025-02-07
http://www.openwall.com/lists/oss-security/2019/06/05/4 2025-02-07
http://www.openwall.com/lists/oss-security/2019/06/06/1 2025-02-07
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Exim
Search vendor "Exim"
Exim
Search vendor "Exim" for product "Exim"
>= 4.87 <= 4.91
Search vendor "Exim" for product "Exim" and version " >= 4.87 <= 4.91"
-
Affected
Canonical
Search vendor "Canonical"
Ubuntu Linux
Search vendor "Canonical" for product "Ubuntu Linux"
18.04
Search vendor "Canonical" for product "Ubuntu Linux" and version "18.04"
lts
Affected
Canonical
Search vendor "Canonical"
Ubuntu Linux
Search vendor "Canonical" for product "Ubuntu Linux"
18.10
Search vendor "Canonical" for product "Ubuntu Linux" and version "18.10"
-
Affected
Debian
Search vendor "Debian"
Debian Linux
Search vendor "Debian" for product "Debian Linux"
9.0
Search vendor "Debian" for product "Debian Linux" and version "9.0"
-
Affected