CVE Vulnerabilities

CVE-2020-28008

Improper Privilege Management

Published: May 06, 2021 | Modified: May 10, 2021
CVSS 3.x
7.8
HIGH
Source:
NVD
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVSS 2.x
7.2 HIGH
AV:L/AC:L/Au:N/C:C/I:C/A:C
RedHat/V2
RedHat/V3
Ubuntu
MEDIUM

Exim 4 before 4.94.2 allows Execution with Unnecessary Privileges. Because Exim operates as root in the spool directory (owned by a non-root user), an attacker can write to a /var/spool/exim4/input spool header file, in which a crafted recipient address can indirectly lead to command execution.

Weakness

The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.

Affected Software

Name Vendor Start Version End Version
Exim Exim 4.00 (including) 4.94.2 (excluding)
Exim4 Ubuntu bionic *
Exim4 Ubuntu devel *
Exim4 Ubuntu esm-infra/xenial *
Exim4 Ubuntu focal *
Exim4 Ubuntu groovy *
Exim4 Ubuntu hirsute *
Exim4 Ubuntu impish *
Exim4 Ubuntu jammy *
Exim4 Ubuntu trusty *
Exim4 Ubuntu trusty/esm *
Exim4 Ubuntu xenial *

Potential Mitigations

References