CVE-2020-28026 - log back

CVE-2020-28026 edited at 06 May 2021 17:30:18
Type
- Arbitrary code execution
+ Arbitrary command execution
Description
- A security issue has been found in Exim before version 4.94.2 that allows for line truncation and injection in spool_read_header(). If exploitable, it would allow an unauthenticated remote attacker to execute arbitrary commands as root (if DSN is enabled).
+ Exim 4 before 4.94.2 has improper neutralization of line delimiters, relevant in non-default configurations that enable Delivery Status Notification (DSN). Certain uses of ORCPT= can place a newline into a spool header file, and indirectly allow unauthenticated remote attackers to execute arbitrary commands as root.
CVE-2020-28026 edited at 04 May 2021 14:51:49
Severity
- Medium
+ High
Type
- Content spoofing
+ Arbitrary code execution
Description
- A security issue has been found in Exim before version 4.94.2 that allows for line truncation and injection in spool_read_header().
+ A security issue has been found in Exim before version 4.94.2 that allows for line truncation and injection in spool_read_header(). If exploitable, it would allow an unauthenticated remote attacker to execute arbitrary commands as root (if DSN is enabled).
References
https://www.openwall.com/lists/oss-security/2021/05/04/6
https://www.qualys.com/2021/05/04/21nails/21nails.txt
+ https://git.exim.org/exim.git/commitdiff/4daba4bec729a57fb0863af786a1395e70794c76
Notes
CVE-2020-28026 edited at 04 May 2021 14:07:11
Severity
- Unknown
+ Medium
Remote
- Unknown
+ Remote
Type
- Unknown
+ Content spoofing
Description
+ A security issue has been found in Exim before version 4.94.2 that allows for line truncation and injection in spool_read_header().
References
+ https://www.openwall.com/lists/oss-security/2021/05/04/6
+ https://www.qualys.com/2021/05/04/21nails/21nails.txt
CVE-2020-28026 created at 04 May 2021 13:46:53