Improper Data Handling Affecting exim-pgsql package, versions <0:4.92-1.23.amzn1


Severity

Recommended
high

Based on Amazon Linux security rating.

Threat Intelligence

EPSS
7.48% (95th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-AMZN201803-EXIMPGSQL-1718071
  • published27 Sept 2021
  • disclosed25 Jul 2019

Introduced: 25 Jul 2019

CVE-2019-13917  (opens in a new tab)
CWE-19  (opens in a new tab)

How to fix?

Upgrade Amazon-Linux:2018.03 exim-pgsql to version 0:4.92-1.23.amzn1 or higher.
This issue was patched in ALAS-2019-1252.

NVD Description

Note: Versions mentioned in the description apply only to the upstream exim-pgsql package and not the exim-pgsql package as distributed by Amazon-Linux. See How to fix? for Amazon-Linux:2018.03 relevant fixed versions and status.

Exim 4.85 through 4.92 (fixed in 4.92.1) allows remote code execution as root in some unusual configurations that use the ${sort } expansion for items that can be controlled by an attacker (e.g., $local_part or $domain).