Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.Test your applications
- Snyk ID SNYK-DEBIAN12-EXIM4-1545043
- published 5 May 2021
- disclosed 6 May 2021
How to fix?
exim4 to version 4.94.2-1 or higher.
Note: Versions mentioned in the description apply to the upstream
How to fix? for
Debian:12 relevant versions.
Exim 4 before 4.94.2 allows Execution with Unnecessary Privileges. Because Exim operates as root in the spool directory (owned by a non-root user), an attacker can write to a /var/spool/exim4/input spool header file, in which a crafted recipient address can indirectly lead to command execution.