Vulnerability Description
Exim 4.85 through 4.92 (fixed in 4.92.1) allows remote code execution as root in some unusual configurations that use the ${sort } expansion for items that can be controlled by an attacker (e.g., $local_part or $domain).
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Exim | Exim | >= 4.85, <= 4.92 |
| Debian | Debian Linux | 9.0 |
Related Weaknesses (CWE)
References
- http://exim.org/static/doc/security/CVE-2019-13917.txtPatchVendor Advisory
- http://www.openwall.com/lists/oss-security/2019/07/26/5Third Party Advisory
- https://seclists.org/bugtraq/2019/Jul/51Third Party Advisory
- https://security.gentoo.org/glsa/201909-06
- https://www.debian.org/security/2019/dsa-4488Third Party Advisory
- http://exim.org/static/doc/security/CVE-2019-13917.txtPatchVendor Advisory
- http://www.openwall.com/lists/oss-security/2019/07/26/5Third Party Advisory
- https://seclists.org/bugtraq/2019/Jul/51Third Party Advisory
- https://security.gentoo.org/glsa/201909-06
- https://www.debian.org/security/2019/dsa-4488Third Party Advisory
FAQ
What is CVE-2019-13917?
CVE-2019-13917 is a vulnerability with a CVSS score of 9.8 (CRITICAL). Exim 4.85 through 4.92 (fixed in 4.92.1) allows remote code execution as root in some unusual configurations that use the ${sort } expansion for items that can be controlled by an attacker (e.g., $loc...
How severe is CVE-2019-13917?
CVE-2019-13917 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2019-13917?
Check the references section above for vendor advisories and patch information. Affected products include: Exim Exim, Debian Debian Linux.