vendor:
Exim
by:
Dawid Golunski
9
CVSS
CRITICAL
Local Root Privilege Escalation
264
CWE
Product Name: Exim
Affected Version From: < 4.86.2
Affected Version To: < 4.86.2
Patch Exists: YES
Related CWE: N/A
CPE: a:exim:exim
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Unix
2016
Exim < 4.86.2 Local Root Privilege Escalation Exploit
The vulnerability stems from Exim in versions below 4.86.2 not performing sanitization of the environment before loading a perl script defined with perl_startup setting in exim config. To perform the attack, attacker can take advantage of the exim's sendmail interface which links to an exim binary that has an SUID bit set on it by default. The attacker can then create a malicious perl script and set it as the perl_startup variable in exim config. When the exim binary is executed with the SUID bit set, it will load the malicious perl script and execute it with root privileges.
Mitigation:
Upgrade to Exim version 4.86.2 or later.