Exim 4 before 4.94.2 allows Execution with Unnecessary Privileges. Because Exim operates as root in the log directory (owned by a non-root user), a symlink or hard link attack allows overwriting critical root-owned files anywhere on the filesystem.
The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Exim | Exim | 4.00 (including) | 4.94.2 (excluding) |
Exim4 | Ubuntu | bionic | * |
Exim4 | Ubuntu | devel | * |
Exim4 | Ubuntu | esm-infra/xenial | * |
Exim4 | Ubuntu | focal | * |
Exim4 | Ubuntu | groovy | * |
Exim4 | Ubuntu | hirsute | * |
Exim4 | Ubuntu | impish | * |
Exim4 | Ubuntu | jammy | * |
Exim4 | Ubuntu | trusty | * |
Exim4 | Ubuntu | trusty/esm | * |
Exim4 | Ubuntu | xenial | * |