Description |
- |
A security issue has been found in Exim before version 4.94.2 that allows for line truncation and injection in spool_read_header(). If exploitable, it would allow an unauthenticated remote attacker to execute arbitrary commands as root (if DSN is enabled). |
+ |
Exim 4 before 4.94.2 has improper neutralization of line delimiters, relevant in non-default configurations that enable Delivery Status Notification (DSN). Certain uses of ORCPT= can place a newline into a spool header file, and indirectly allow unauthenticated remote attackers to execute arbitrary commands as root. |
|