CVE Vulnerabilities

CVE-2020-28008

Improper Privilege Management

Published: May 06, 2021 | Modified: Nov 21, 2024
CVSS 3.x
7.8
HIGH
Source:
NVD
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVSS 2.x
7.2 HIGH
AV:L/AC:L/Au:N/C:C/I:C/A:C
RedHat/V2
RedHat/V3
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

Exim 4 before 4.94.2 allows Execution with Unnecessary Privileges. Because Exim operates as root in the spool directory (owned by a non-root user), an attacker can write to a /var/spool/exim4/input spool header file, in which a crafted recipient address can indirectly lead to command execution.

Weakness

The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.

Affected Software

NameVendorStart VersionEnd Version
EximExim4.00 (including)4.94.2 (excluding)
Exim4Ubuntubionic*
Exim4Ubuntudevel*
Exim4Ubuntuesm-infra-legacy/trusty*
Exim4Ubuntuesm-infra/bionic*
Exim4Ubuntuesm-infra/focal*
Exim4Ubuntuesm-infra/xenial*
Exim4Ubuntufocal*
Exim4Ubuntugroovy*
Exim4Ubuntuhirsute*
Exim4Ubuntuimpish*
Exim4Ubuntujammy*
Exim4Ubuntutrusty*
Exim4Ubuntutrusty/esm*
Exim4Ubuntuxenial*

Potential Mitigations

References