First published: Thu Apr 07 2016(Updated: )
Exim before 4.86.2, when installed setuid root, allows local users to gain privileges via the perl_startup argument.
Credit: cret@cert.org
Affected Software | Affected Version | How to fix |
---|---|---|
sa-exim | <=4.86 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-1531 has a high severity rating as it allows local users to escalate privileges on affected systems.
To fix CVE-2016-1531, upgrade Exim to version 4.86.2 or later.
CVE-2016-1531 affects systems where Exim versions prior to 4.86.2 are installed with setuid root permissions.
The impact of CVE-2016-1531 is that a local user can potentially gain root privileges, compromising the security of the system.
CVE-2016-1531 was published in March 2016.