First published: Thu Sep 04 2014(Updated: )
The dmarc_process function in dmarc.c in Exim before 4.82.1, when EXPERIMENTAL_DMARC is enabled, allows remote attackers to execute arbitrary code via the From header in an email, which is passed to the expand_string function.
Credit: cret@cert.org
Affected Software | Affected Version | How to fix |
---|---|---|
Exim Exim | <=4.82 | |
Exim Exim | =4.00 | |
Exim Exim | =4.01 | |
Exim Exim | =4.02 | |
Exim Exim | =4.03 | |
Exim Exim | =4.04 | |
Exim Exim | =4.05 | |
Exim Exim | =4.10 | |
Exim Exim | =4.11 | |
Exim Exim | =4.12 | |
Exim Exim | =4.14 | |
Exim Exim | =4.20 | |
Exim Exim | =4.21 | |
Exim Exim | =4.22 | |
Exim Exim | =4.23 | |
Exim Exim | =4.24 | |
Exim Exim | =4.30 | |
Exim Exim | =4.31 | |
Exim Exim | =4.32 | |
Exim Exim | =4.33 | |
Exim Exim | =4.34 | |
Exim Exim | =4.40 | |
Exim Exim | =4.41 | |
Exim Exim | =4.42 | |
Exim Exim | =4.43 | |
Exim Exim | =4.44 | |
Exim Exim | =4.50 | |
Exim Exim | =4.51 | |
Exim Exim | =4.52 | |
Exim Exim | =4.53 | |
Exim Exim | =4.54 | |
Exim Exim | =4.60 | |
Exim Exim | =4.61 | |
Exim Exim | =4.62 | |
Exim Exim | =4.63 | |
Exim Exim | =4.64 | |
Exim Exim | =4.65 | |
Exim Exim | =4.66 | |
Exim Exim | =4.67 | |
Exim Exim | =4.68 | |
Exim Exim | =4.69 | |
Exim Exim | =4.70 | |
Exim Exim | =4.71 | |
Exim Exim | =4.72 | |
Exim Exim | =4.73 | |
Exim Exim | =4.74 | |
Exim Exim | =4.75 | |
Exim Exim | =4.76 | |
Exim Exim | =4.77 | |
Exim Exim | =4.80 | |
Exim Exim | =4.80.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.