vendor:
Exim
by:
Marco Ivaldi
9.8
CVSS
CRITICAL
Improper validation of recipient address in deliver_message() function in /src/deliver.c
264
CWE
Product Name: Exim
Affected Version From: 4.87
Affected Version To: 4.91
Patch Exists: YES
Related CWE: CVE-2019-10149
CPE: a:exim:exim:4.87
Metasploit:
https://www.rapid7.com/db/vulnerabilities/exim-cve-2019-10149/, https://www.rapid7.com/db/vulnerabilities/debian-cve-2019-10149/, https://www.rapid7.com/db/vulnerabilities/gentoo-linux-cve-2019-10149/, https://www.rapid7.com/db/vulnerabilities/alpine-linux-cve-2019-10149/, https://www.rapid7.com/db/vulnerabilities/suse-cve-2019-10149/, https://www.rapid7.com/db/vulnerabilities/amazon_linux-cve-2019-10149/, https://www.rapid7.com/db/vulnerabilities/ubuntu-cve-2019-10149/, https://www.rapid7.com/db/modules/exploit/linux/local/exim4_deliver_message_priv_esc/
Other Scripts:
N/A
Platforms Tested: Debian GNU/Linux 9 (stretch)
2019
raptor_exim_wiz – The Return of the WIZard LPE exploit
A flaw was found in Exim versions 4.87 to 4.91 (inclusive). Improper validation of recipient address in deliver_message() function in /src/deliver.c may lead to remote command execution. This is a local privilege escalation exploit for 'The Return of the WIZard' vulnerability reported by the Qualys Security Advisory team.
Mitigation:
Upgrade to Exim version 4.92 or later