Vulnerability Name: | CVE-2016-9963 (CCN-119848) | ||||||||||||||||||||||||||||||||||||
Assigned: | 2016-12-16 | ||||||||||||||||||||||||||||||||||||
Published: | 2016-12-16 | ||||||||||||||||||||||||||||||||||||
Updated: | 2017-02-15 | ||||||||||||||||||||||||||||||||||||
Summary: | Exim before 4.87.1 might allow remote attackers to obtain the private DKIM signing key via vectors related to log files and bounce messages. | ||||||||||||||||||||||||||||||||||||
CVSS v3 Severity: | 5.9 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N) 5.2 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C)
3.8 Low (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C)
| ||||||||||||||||||||||||||||||||||||
CVSS v2 Severity: | 2.6 Low (CVSS v2 Vector: AV:N/AC:H/Au:N/C:P/I:N/A:N)
| ||||||||||||||||||||||||||||||||||||
Vulnerability Type: | CWE-320 | ||||||||||||||||||||||||||||||||||||
Vulnerability Consequences: | Obtain Information | ||||||||||||||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2016-9963 Source: CCN Type: SECTRACK ID: 1037484 Exim Flaw Lets Remote Users Obtain Potentially Sensitive Information on the Target System Source: DEBIAN Type: Third Party Advisory DSA-3747 Source: CCN Type: Exim Web Site Exim Internet Mailer Source: CONFIRM Type: Mitigation, Vendor Advisory http://www.exim.org/static/doc/CVE-2016-9963.txt Source: CCN Type: oss-sec Mailing List, Fri, 16 Dec 2016 00:36:45 +0100 CVE Request - Exim 4.69-4.87 - disclosure of private information Source: BID Type: Third Party Advisory, VDB Entry 94947 Source: CCN Type: BID-94947 Exim CVE-2016-9963 Unspecified Information Disclosure Vulnerability Source: SECTRACK Type: Third Party Advisory, VDB Entry 1037484 Source: UBUNTU Type: Third Party Advisory USN-3164-1 Source: CONFIRM Type: Issue Tracking, Mitigation, Vendor Advisory https://bugs.exim.org/show_bug.cgi?id=1996 Source: XF Type: UNKNOWN exim-cve20169963-info-disc(119848) | ||||||||||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration 3: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||
BACK |