Vulnerability CVE-2019-10149


Published: 2019-06-05

Description:
A flaw was found in Exim versions 4.87 to 4.91 (inclusive). Improper validation of recipient address in deliver_message() function in /src/deliver.c may lead to remote command execution.

See advisories in our WLB2 database:
Topic
Author
Date
High
Exim 4.9.1 Remote Command Execution
Qualys
07.06.2019
Med.
Exim 4.87 / 4.91 Local Privilege Escalation (Metasploit)
Qualys
27.08.2019

Type:

CWE-20

(Improper Input Validation)

CVSS2 => (AV:N/AC:L/Au:N/C:P/I:P/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
7.5/10
6.4/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
Partial
Partial
Affected software
EXIM -> EXIM 

 References:
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00020.html
http://packetstormsecurity.com/files/153218/Exim-4.9.1-Remote-Command-Execution.html
http://packetstormsecurity.com/files/153312/Exim-4.91-Local-Privilege-Escalation.html
http://seclists.org/fulldisclosure/2019/Jun/16
http://www.openwall.com/lists/oss-security/2019/06/05/2
http://www.openwall.com/lists/oss-security/2019/06/05/3
http://www.openwall.com/lists/oss-security/2019/06/05/4
http://www.openwall.com/lists/oss-security/2019/06/06/1
http://www.securityfocus.com/bid/108679
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10149
https://seclists.org/bugtraq/2019/Jun/5
https://security.gentoo.org/glsa/201906-01
https://usn.ubuntu.com/4010-1/
https://www.debian.org/security/2019/dsa-4456
https://www.exim.org/static/doc/security/CVE-2019-10149.txt

Copyright 2024, cxsecurity.com

 

Back to Top