CVE-2020-28008
06.05.2021, 13:15
Exim 4 before 4.94.2 allows Execution with Unnecessary Privileges. Because Exim operates as root in the spool directory (owned by a non-root user), an attacker can write to a /var/spool/exim4/input spool header file, in which a crafted recipient address can indirectly lead to command execution.Enginsight
Vendor | Product | Version |
---|---|---|
exim | exim | 4.00 ≤ 𝑥 < 4.94.2 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Ubuntu Product | |||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
exim4 |
|
Common Weakness Enumeration