sa-exim 4.2.1 allows attackers to execute arbitrary code if they can write a .cf file or a rule. This occurs because Greylisting.pm relies on eval (rather than direct parsing and/or use of the taint feature). This issue is similar to CVE-2018-11805.
References
Link | Resource |
---|---|
https://marc.info/?l=spamassassin-users&m=157668305026635&w=2 | Mailing List Third Party Advisory |
https://marc.info/?l=spamassassin-users&m=157668107325768&w=2 | Mailing List Third Party Advisory |
https://bugs.debian.org/946829#24 | Mailing List Patch Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2020/01/msg00006.html | Mailing List Third Party Advisory |
https://usn.ubuntu.com/4520-1/ | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Information
Published : 2019-12-22 10:15
Updated : 2022-12-14 10:44
NVD link : CVE-2019-19920
Mitre link : CVE-2019-19920
JSON object : View
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Products Affected
debian
- debian_linux
sa-exim_project
- sa-exim
canonical
- ubuntu_linux