Vulnerability Name: | CVE-2019-10149 (CCN-162146) | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Assigned: | 2019-06-03 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Published: | 2019-06-03 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Updated: | 2022-11-07 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Summary: | A flaw was found in Exim versions 4.87 to 4.91 (inclusive). Improper validation of recipient address in deliver_message() function in /src/deliver.c may lead to remote command execution. | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
CVSS v3 Severity: | 9.8 Critical (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) 9.1 Critical (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C)
9.1 Critical (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C)
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
CVSS v2 Severity: | 10.0 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C)
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerability Type: | CWE-78 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2019-10149 Source: SUSE Type: Mailing List, Third Party Advisory openSUSE-SU-2019:1524 Source: MISC Type: Exploit, Third Party Advisory, VDB Entry http://packetstormsecurity.com/files/153218/Exim-4.9.1-Remote-Command-Execution.html Source: MISC Type: Exploit, Third Party Advisory, VDB Entry http://packetstormsecurity.com/files/153312/Exim-4.91-Local-Privilege-Escalation.html Source: MISC Type: Exploit, Third Party Advisory, VDB Entry http://packetstormsecurity.com/files/154198/Exim-4.91-Local-Privilege-Escalation.html Source: FULLDISC Type: Mailing List, Third Party Advisory 20190611 The Return of the WIZard: RCE in Exim (CVE-2019-10149) Source: CCN Type: Exim Web site CVE-2019-10149 Exim 4.87 to 4.91 Source: MLIST Type: Mailing List, Third Party Advisory [oss-security] 20190605 Re: CVE-2019-10149: Exim 4.87 to 4.91: possible remote exploit Source: MLIST Type: Mailing List, Patch, Third Party Advisory [oss-security] 20190605 Re: CVE-2019-10149: Exim 4.87 to 4.91: possible remote exploit Source: MLIST Type: Exploit, Mailing List [oss-security] 20190605 Re: CVE-2019-10149: Exim 4.87 to 4.91: possible remote exploit Source: MLIST Type: Exploit, Mailing List, Third Party Advisory [oss-security] 20190606 Re: CVE-2019-10149: Exim 4.87 to 4.91: possible remote exploit Source: MLIST Type: Mailing List, Third Party Advisory [oss-security] 20190725 Re: Statistics for distros lists updated for 2019Q2 Source: MLIST Type: Mailing List, Third Party Advisory [oss-security] 20190725 Re: Statistics for distros lists updated for 2019Q2 Source: MLIST Type: Mailing List, Third Party Advisory [oss-security] 20190726 Re: Statistics for distros lists updated for 2019Q2 Source: MLIST Type: Mailing List, Third Party Advisory [oss-security] 20210504 21Nails: Multiple vulnerabilities in Exim Source: BID Type: Broken Link, Third Party Advisory, VDB Entry 108679 Source: CONFIRM Type: Issue Tracking, Third Party Advisory https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10149 Source: XF Type: UNKNOWN exim-cve201910149-code-exec(162146) Source: CCN Type: Packet Storm Security [06-17-2019] Exim 4.91 Local Privilege Escalation Source: CCN Type: Packet Storm Security [08-23-2019] Exim 4.91 Local Privilege Escalation Source: BUGTRAQ Type: Mailing List, Third Party Advisory 20190605 [SECURITY] [DSA 4456-1] exim4 security update Source: CCN Type: oss-sec Mailing List, Mon, 3 Jun 2019 22:19:23 +0200 CVE-2019-10149: Exim 4.87 to 4.91: possible remote exploit Source: GENTOO Type: Third Party Advisory GLSA-201906-01 Source: UBUNTU Type: Third Party Advisory USN-4010-1 Source: CCN Type: CYBERSECURITY & INFRASTRUCTURE SECURITY AGENCY KNOWN EXPLOITED VULNERABILITIES CATALOG Source: DEBIAN Type: Third Party Advisory DSA-4456 Source: CONFIRM Type: Vendor Advisory https://www.exim.org/static/doc/security/CVE-2019-10149.txt Source: EXPLOIT-DB Type: EXPLOIT Offensive Security Exploit Database [06-05-2019] Source: EXPLOIT-DB Type: EXPLOIT Offensive Security Exploit Database [08-26-2019] | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration CCN 1: ![]() | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
BACK |