Your submission was sent successfully! Close


Published: 04 May 2021

Exim 4 before 4.94.2 allows Execution with Unnecessary Privileges. Because Exim operates as root in the spool directory (owned by a non-root user), an attacker can write to a /var/spool/exim4/input spool header file, in which a crafted recipient address can indirectly lead to command execution.



CVSS 3 base score: 7.8


Package Release Status
Launchpad, Ubuntu, Debian
Upstream Needs triage

Ubuntu 21.10 (Impish Indri)
Released (4.94-15ubuntu1.2)
Ubuntu 21.04 (Hirsute Hippo)
Released (4.94-15ubuntu1.2)
Ubuntu 20.04 LTS (Focal Fossa)
Released (4.93-13ubuntu1.5)
Ubuntu 18.04 LTS (Bionic Beaver)
Released (4.90.1-1ubuntu1.8)
Ubuntu 16.04 ESM (Xenial Xerus)
Released (4.86.2-2ubuntu2.6+esm1)
Ubuntu 14.04 ESM (Trusty Tahr)
Released (4.82-3ubuntu2.4+esm3)