Exim 4 prior to 4.94.2 allows Execution with Unnecessary Privileges. Because Exim operates as root in the log directory (owned by a non-root user), a symlink or hard link attack allows overwriting critical root-owned files anywhere on the filesystem.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
exim exim |