Search for packages
purl | pkg:alpm/archlinux/exim@4.89.1-1 |
Vulnerability | Summary | Fixed by |
---|---|---|
This package is not known to be affected by vulnerabilities. |
Vulnerability | Summary | Aliases |
---|---|---|
VCID-2wh9-dmdb-aaad | Postfix before 2.11.10, 3.0.x before 3.0.10, 3.1.x before 3.1.6, and 3.2.x before 3.2.2 might allow local users to gain privileges by leveraging undocumented functionality in Berkeley DB 2.x and later, related to reading settings from DB_CONFIG in the current directory. |
CVE-2017-10140
|
VCID-5mct-n1a5-aaad | The receive_msg function in receive.c in the SMTP daemon in Exim 4.88 and 4.89 allows remote attackers to cause a denial of service (infinite loop and stack exhaustion) via vectors involving BDAT commands and an improper check for a '.' character signifying the end of the content, related to the bdat_getc function. |
CVE-2017-16944
|
VCID-6p9m-9u9v-aaaa | The receive_msg function in receive.c in the SMTP daemon in Exim 4.88 and 4.89 allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free) via vectors involving BDAT commands. |
CVE-2017-16943
|
VCID-97g7-zfqp-aaag | Exim supports the use of multiple "-p" command line arguments which are malloc()'ed and never free()'ed, used in conjunction with other issues allows attackers to cause arbitrary code execution. This affects exim version 4.89 and earlier. Please note that at this time upstream has released a patch (commit 65e061b76867a9ea7aeeb535341b790b90ae6c21), but it is not known if a new point release is available that addresses this issue at this time. |
CVE-2017-1000369
|
Date | Actor | Action | Vulnerability | Source | VulnerableCode Version |
---|---|---|---|---|---|
2025-03-28T07:44:38.648611+00:00 | Arch Linux Importer | Fixing | VCID-97g7-zfqp-aaag | https://security.archlinux.org/AVG-518 | 36.0.0 |
2025-03-28T07:44:38.617192+00:00 | Arch Linux Importer | Fixing | VCID-2wh9-dmdb-aaad | https://security.archlinux.org/AVG-518 | 36.0.0 |
2025-03-28T07:44:38.585842+00:00 | Arch Linux Importer | Fixing | VCID-6p9m-9u9v-aaaa | https://security.archlinux.org/AVG-518 | 36.0.0 |
2025-03-28T07:44:38.565337+00:00 | Arch Linux Importer | Fixing | VCID-5mct-n1a5-aaad | https://security.archlinux.org/AVG-518 | 36.0.0 |
2024-09-18T01:59:42.388373+00:00 | Arch Linux Importer | Fixing | VCID-97g7-zfqp-aaag | https://security.archlinux.org/AVG-518 | 34.0.1 |
2024-09-18T01:59:42.368152+00:00 | Arch Linux Importer | Fixing | VCID-2wh9-dmdb-aaad | https://security.archlinux.org/AVG-518 | 34.0.1 |
2024-09-18T01:59:42.347918+00:00 | Arch Linux Importer | Fixing | VCID-6p9m-9u9v-aaaa | https://security.archlinux.org/AVG-518 | 34.0.1 |
2024-09-18T01:59:42.327458+00:00 | Arch Linux Importer | Fixing | VCID-5mct-n1a5-aaad | https://security.archlinux.org/AVG-518 | 34.0.1 |
2024-07-16T23:12:52.604476+00:00 | Arch Linux Importer | Fixing | VCID-97g7-zfqp-aaag | https://security.archlinux.org/AVG-518 | 34.0.0rc4 |
2024-07-16T23:12:52.582459+00:00 | Arch Linux Importer | Fixing | VCID-2wh9-dmdb-aaad | https://security.archlinux.org/AVG-518 | 34.0.0rc4 |
2024-07-16T23:12:52.560642+00:00 | Arch Linux Importer | Fixing | VCID-6p9m-9u9v-aaaa | https://security.archlinux.org/AVG-518 | 34.0.0rc4 |
2024-07-16T23:12:52.538597+00:00 | Arch Linux Importer | Fixing | VCID-5mct-n1a5-aaad | https://security.archlinux.org/AVG-518 | 34.0.0rc4 |
2024-01-03T22:25:58.142826+00:00 | Arch Linux Importer | Fixing | VCID-97g7-zfqp-aaag | https://security.archlinux.org/AVG-518 | 34.0.0rc1 |
2024-01-03T22:25:58.116159+00:00 | Arch Linux Importer | Fixing | VCID-2wh9-dmdb-aaad | https://security.archlinux.org/AVG-518 | 34.0.0rc1 |
2024-01-03T22:25:58.089518+00:00 | Arch Linux Importer | Fixing | VCID-6p9m-9u9v-aaaa | https://security.archlinux.org/AVG-518 | 34.0.0rc1 |
2024-01-03T22:25:58.065691+00:00 | Arch Linux Importer | Fixing | VCID-5mct-n1a5-aaad | https://security.archlinux.org/AVG-518 | 34.0.0rc1 |