Show filters
6 Total Results
Displaying 1-6 of 6
Sort by:
Attacker Value
Unknown
CVE-2014-2957
Disclosure Date: September 04, 2014 (last updated October 05, 2023)
The dmarc_process function in dmarc.c in Exim before 4.82.1, when EXPERIMENTAL_DMARC is enabled, allows remote attackers to execute arbitrary code via the From header in an email, which is passed to the expand_string function.
0
Attacker Value
Unknown
CVE-2014-2972
Disclosure Date: September 04, 2014 (last updated October 05, 2023)
expand.c in Exim before 4.83 expands mathematical comparisons twice, which allows local users to gain privileges and execute arbitrary commands via a crafted lookup value.
0
Attacker Value
Unknown
CVE-2012-5671
Disclosure Date: October 31, 2012 (last updated October 05, 2023)
Heap-based buffer overflow in the dkim_exim_query_dns_txt function in dkim.c in Exim 4.70 through 4.80, when DKIM support is enabled and acl_smtp_connect and acl_smtp_rcpt are not set to "warn control = dkim_disable_verify," allows remote attackers to execute arbitrary code via an email from a malicious DNS server.
0
Attacker Value
Unknown
CVE-2011-1764
Disclosure Date: October 05, 2011 (last updated October 04, 2023)
Format string vulnerability in the dkim_exim_verify_finish function in src/dkim.c in Exim before 4.76 might allow remote attackers to execute arbitrary code or cause a denial of service (daemon crash) via format string specifiers in data used in DKIM logging, as demonstrated by an identity field containing a % (percent) character.
0
Attacker Value
Unknown
CVE-2011-1407
Disclosure Date: May 16, 2011 (last updated October 04, 2023)
The DKIM implementation in Exim 4.7x before 4.76 permits matching for DKIM identities to apply to lookup items, instead of only strings, which allows remote attackers to execute arbitrary code or access a filesystem via a crafted identity.
0
Attacker Value
Unknown
CVE-2011-0017
Disclosure Date: February 02, 2011 (last updated October 04, 2023)
The open_log function in log.c in Exim 4.72 and earlier does not check the return value from (1) setuid or (2) setgid system calls, which allows local users to append log data to arbitrary files via a symlink attack.
0