801
VMScore

CVE-2019-19920

Published: 22/12/2019 Updated: 14/12/2022
CVSS v2 Base Score: 9 | Impact Score: 10 | Exploitability Score: 8
CVSS v3 Base Score: 8.8 | Impact Score: 5.9 | Exploitability Score: 2.8
VMScore: 801
Vector: AV:N/AC:L/Au:S/C:C/I:C/A:C

Vulnerability Summary

sa-exim 4.2.1 allows malicious users to execute arbitrary code if they can write a .cf file or a rule. This occurs because Greylisting.pm relies on eval (rather than direct parsing and/or use of the taint feature). This issue is similar to CVE-2018-11805.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

sa-exim project sa-exim 4.2.1

debian debian linux 8.0

debian debian linux 9.0

debian debian linux 10.0

canonical ubuntu linux 16.04

Vendor Advisories

Debian Bug report logs - #947198 sa-exim: CVE-2019-19920 Package: sa-exim; Maintainer for sa-exim is Magnus Holmgren <holmgren@debianorg>; Source for sa-exim is src:sa-exim (PTS, buildd, popcon) Affects: securitydebianorg, releasedebianorg Reported by: Marco Gaiarin <gaio@svlnfit> Date: Mon, 16 Dec 2019 10:33:0 ...