Exim before 4.87.1 might allow remote attackers to obtain the private DKIM signing key via vectors related to log files and bounce messages.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Exim | Exim | * | 4.87 (including) |
Exim4 | Ubuntu | devel | * |
Exim4 | Ubuntu | precise | * |
Exim4 | Ubuntu | trusty | * |
Exim4 | Ubuntu | upstream | * |
Exim4 | Ubuntu | xenial | * |
Exim4 | Ubuntu | yakkety | * |