First published: Mon Dec 23 2002(Updated: )
Format string vulnerability in daemon.c for Exim 4.x through 4.10, and 3.x through 3.36, allows exim administrative users to execute arbitrary code by modifying the pid_file_path value.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Exim | =3.35 | |
Exim | =3.36 | |
Exim | =4.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2002-1381 is considered to be a high severity vulnerability due to its potential to allow arbitrary code execution by administrative users.
To fix CVE-2002-1381, you should upgrade Exim to a version that is not affected, specifically to Exim 4.10 or later.
CVE-2002-1381 affects Exim versions 3.35 to 3.36 and 4.x up to 4.10.
Any administrative users of Exim versions 4.x through 4.10 and 3.x through 3.36 are at risk from CVE-2002-1381.
CVE-2002-1381 is classified as a format string vulnerability, which can lead to remote code execution.