7.2
CVSSv2

CVE-2002-1381

Published: 23/12/2002 Updated: 10/10/2017
CVSS v2 Base Score: 7.2 | Impact Score: 10 | Exploitability Score: 3.9
VMScore: 725
Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

Format string vulnerability in daemon.c for Exim 4.x up to and including 4.10, and 3.x up to and including 3.36, allows exim administrative users to execute arbitrary code by modifying the pid_file_path value.

Vulnerable Product Search on Vulmon Subscribe to Product

university of cambridge exim 3.35

university of cambridge exim 3.36

university of cambridge exim 4.10

Exploits

source: wwwsecurityfocuscom/bid/6314/info A format string vulnerability has been discovered in Exim The problem occurs in the daemon_go() function By supplying malicious format strings via the command line, it is possible for an attacker to execute arbitrary code with root privileges It should be noted that the execution of the daemon ...