4.6
CVSSv2

CVE-2019-18862

Published: 11/11/2019 Updated: 24/08/2020
CVSS v2 Base Score: 4.6 | Impact Score: 6.4 | Exploitability Score: 3.9
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
VMScore: 465
Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

maidag in GNU Mailutils prior to 3.8 is installed setuid and allows local privilege escalation in the url mode.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

gnu mailutils

Vendor Advisories

Debian Bug report logs - #944265 mailutils: local privilege escalation in maidag utility (fixed in 38) (CVE-2019-18862) Package: src:mailutils; Maintainer for src:mailutils is Jordi Mallach <jordi@debianorg>; Reported by: Paul Wise <pabs@debianorg> Date: Thu, 7 Nov 2019 00:00:02 UTC Severity: serious Tags: fixed- ...

Exploits

# Exploit Title: GNU Mailutils 37 - Local Privilege Escalation # Date: 2019-11-06 # Exploit Author: Mike Gualtieri # Vendor Homepage: mailutilsorg/ # Software Link: ftpgnuorg/gnu/mailutils/mailutils-37targz # Version: 20 <= 37 # Tested on: Gentoo # CVE : CVE-2019-18862 Title : GNU Mailutils / Maidag Local Privilege Es ...
GNU Mailutils versions 20 through 37 suffer from a local privilege escalation vulnerability ...