First published: Thu Jul 25 2019(Updated: )
Exim 4.85 through 4.92 (fixed in 4.92.1) allows remote code execution as root in some unusual configurations that use the ${sort } expansion for items that can be controlled by an attacker (e.g., $local_part or $domain).
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Exim Exim | >=4.85<=4.92 | |
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 | |
debian/exim4 | 4.92-8+deb10u6 4.92-8+deb10u8 4.94.2-7 4.94.2-7+deb11u1 4.96-15+deb12u1 4.96-15+deb12u2 4.97~RC2-2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-13917 is a vulnerability in Exim 4.85 through 4.92 that allows remote code execution as root in certain configurations.
CVE-2019-13917 has a severity rating of critical (9.8).
CVE-2019-13917 allows remote code execution by exploiting certain configurations that use the ${sort } expansion for controllable items, such as $local_part or $domain.
Exim versions 4.85 through 4.92 are affected by CVE-2019-13917.
The vulnerability has been fixed in Exim version 4.92.1, so updating to this version or later will fix the issue.