VID |
18121 |
Severity |
40 |
Port |
25 |
Protocol |
TCP |
Class |
SMTP |
Detailed Description |
According to its banner, the version of Exim running on the remote host is between 4.87 and 4.91 (inclusive). It is, therefore, potentially affected by a remote command execution vulnerability. A flaw exists in the deliver_message() function that could allow an attacker to execute arbitrary commands via a specially crafted email.
* Note: This check solely relied on the banner of the remote SMTP server to assess this vulnerability, so this might be a false positive.
* References: https://www.tenable.com/blog/cve-2019-10149-critical-remote-command-execution-vulnerability-discovered-in-exim https://exim.org/static/doc/security/CVE-2019-10149.txt ftp://ftp.exim.org/pub/exim/exim4/ChangeLog
* Platforms Affected: Cambridge University, Exim versions prior to 4.92 Unix Any version Linux Any version |
Recommendation |
Upgrade to the latest exim package (4.92 or later), available from the Exim Internet Mailer Web site at http://www.exim.org/ |
Related URL |
CVE-2019-10149 (CVE) |
Related URL |
(SecurityFocus) |
Related URL |
(ISS) |
|