Search for packages
Package details: pkg:alpm/archlinux/exim@4.94-3
purl pkg:alpm/archlinux/exim@4.94-3
Next non-vulnerable version 4.94.2-1
Latest non-vulnerable version 4.98.2-1
Risk 4.4
Vulnerabilities affecting this package (19)
Vulnerability Summary Fixed by
VCID-2sjc-drqj-aaaf
Aliases:
CVE-2020-28015
Exim 4 before 4.94.2 has Improper Neutralization of Line Delimiters. Local users can alter the behavior of root processes because a recipient address can have a newline character.
4.94.2-1
Affected by 0 other vulnerabilities.
VCID-5ket-3f28-aaan
Aliases:
CVE-2020-28021
Exim 4 before 4.94.2 has Improper Neutralization of Line Delimiters. An authenticated remote SMTP client can insert newline characters into a spool file (which indirectly leads to remote code execution as root) via AUTH= in a MAIL FROM command.
4.94.2-1
Affected by 0 other vulnerabilities.
VCID-63g4-j4nd-aaad
Aliases:
CVE-2020-28011
Exim 4 before 4.94.2 allows Heap-based Buffer Overflow in queue_run via two sender options: -R and -S. This may cause privilege escalation from exim to root.
4.94.2-1
Affected by 0 other vulnerabilities.
VCID-88fs-zb4r-aaac
Aliases:
CVE-2020-28014
Exim 4 before 4.94.2 allows Execution with Unnecessary Privileges. The -oP option is available to the exim user, and allows a denial of service because root-owned files can be overwritten.
4.94.2-1
Affected by 0 other vulnerabilities.
VCID-c6q6-m6rw-aaap
Aliases:
CVE-2020-28022
Exim 4 before 4.94.2 has Improper Restriction of Write Operations within the Bounds of a Memory Buffer. This occurs when processing name=value pairs within MAIL FROM and RCPT TO commands.
4.94.2-1
Affected by 0 other vulnerabilities.
VCID-cjv1-kfbs-aaag
Aliases:
CVE-2020-28026
Exim 4 before 4.94.2 has Improper Neutralization of Line Delimiters, relevant in non-default configurations that enable Delivery Status Notification (DSN). Certain uses of ORCPT= can place a newline into a spool header file, and indirectly allow unauthenticated remote attackers to execute arbitrary commands as root.
4.94.2-1
Affected by 0 other vulnerabilities.
VCID-dar1-s72w-aaap
Aliases:
CVE-2020-28012
Exim 4 before 4.94.2 allows Exposure of File Descriptor to Unintended Control Sphere because rda_interpret uses a privileged pipe that lacks a close-on-exec flag.
4.94.2-1
Affected by 0 other vulnerabilities.
VCID-fp42-vdmb-aaaa
Aliases:
CVE-2020-28018
Exim 4 before 4.94.2 allows Use After Free in smtp_reset in certain situations that may be common for builds with OpenSSL.
4.94.2-1
Affected by 0 other vulnerabilities.
VCID-ms2c-kqz5-aaas
Aliases:
CVE-2020-28017
Exim 4 before 4.94.2 allows Integer Overflow to Buffer Overflow in receive_add_recipient via an e-mail message with fifty million recipients. NOTE: remote exploitation may be difficult because of resource consumption.
4.94.2-1
Affected by 0 other vulnerabilities.
VCID-nfxa-nhgz-aaaf
Aliases:
CVE-2020-28025
Exim 4 before 4.94.2 allows Out-of-bounds Read because pdkim_finish_bodyhash does not validate the relationship between sig->bodyhash.len and b->bh.len; thus, a crafted DKIM-Signature header might lead to a leak of sensitive information from process memory.
4.94.2-1
Affected by 0 other vulnerabilities.
VCID-qzhj-an3g-aaag
Aliases:
CVE-2020-28010
Exim 4 before 4.94.2 allows Out-of-bounds Write because the main function, while setuid root, copies the current working directory pathname into a buffer that is too small (on some common platforms).
4.94.2-1
Affected by 0 other vulnerabilities.
VCID-rq3j-uyp1-aaah
Aliases:
CVE-2020-28009
Exim 4 before 4.94.2 allows Integer Overflow to Buffer Overflow because get_stdinput allows unbounded reads that are accompanied by unbounded increases in a certain size variable. NOTE: exploitation may be impractical because of the execution time needed to overflow (multiple days).
4.94.2-1
Affected by 0 other vulnerabilities.
VCID-t7p1-8mcp-aaaj
Aliases:
CVE-2020-28016
Exim 4 before 4.94.2 allows an off-by-two Out-of-bounds Write because "-F ''" is mishandled by parse_fix_phrase.
4.94.2-1
Affected by 0 other vulnerabilities.
VCID-v8mn-cp7h-aaaf
Aliases:
CVE-2020-28023
Exim 4 before 4.94.2 allows Out-of-bounds Read. smtp_setup_msg may disclose sensitive information from process memory to an unauthenticated SMTP client.
4.94.2-1
Affected by 0 other vulnerabilities.
VCID-v95c-2sp9-aaan
Aliases:
CVE-2020-28008
Exim 4 before 4.94.2 allows Execution with Unnecessary Privileges. Because Exim operates as root in the spool directory (owned by a non-root user), an attacker can write to a /var/spool/exim4/input spool header file, in which a crafted recipient address can indirectly lead to command execution.
4.94.2-1
Affected by 0 other vulnerabilities.
VCID-v9dw-pa2e-aaaa
Aliases:
CVE-2020-28013
Exim 4 before 4.94.2 allows Heap-based Buffer Overflow because it mishandles "-F '.('" on the command line, and thus may allow privilege escalation from any user to root. This occurs because of the interpretation of negative sizes in strncpy.
4.94.2-1
Affected by 0 other vulnerabilities.
VCID-w3f9-2bds-aaah
Aliases:
CVE-2020-28019
Exim 4 before 4.94.2 has Improper Initialization that can lead to recursion-based stack consumption or other consequences. This occurs because use of certain getc functions is mishandled when a client uses BDAT instead of DATA.
4.94.2-1
Affected by 0 other vulnerabilities.
VCID-w8z8-chwq-aaap
Aliases:
CVE-2020-28007
Exim 4 before 4.94.2 allows Execution with Unnecessary Privileges. Because Exim operates as root in the log directory (owned by a non-root user), a symlink or hard link attack allows overwriting critical root-owned files anywhere on the filesystem.
4.94.2-1
Affected by 0 other vulnerabilities.
VCID-zd9g-egsv-aaap
Aliases:
CVE-2020-28024
Exim 4 before 4.94.2 allows Buffer Underwrite that may result in unauthenticated remote attackers executing arbitrary commands, because smtp_ungetc was only intended to push back characters, but can actually push back non-character error codes such as EOF.
4.94.2-1
Affected by 0 other vulnerabilities.
Vulnerabilities fixed by this package (0)
Vulnerability Summary Aliases
This package is not known to fix vulnerabilities.

Date Actor Action Vulnerability Source VulnerableCode Version
2025-03-28T07:45:37.240780+00:00 Arch Linux Importer Affected by VCID-w8z8-chwq-aaap https://security.archlinux.org/AVG-1911 36.0.0
2025-03-28T07:45:37.222207+00:00 Arch Linux Importer Affected by VCID-v95c-2sp9-aaan https://security.archlinux.org/AVG-1911 36.0.0
2025-03-28T07:45:37.203363+00:00 Arch Linux Importer Affected by VCID-rq3j-uyp1-aaah https://security.archlinux.org/AVG-1911 36.0.0
2025-03-28T07:45:37.184527+00:00 Arch Linux Importer Affected by VCID-qzhj-an3g-aaag https://security.archlinux.org/AVG-1911 36.0.0
2025-03-28T07:45:37.165969+00:00 Arch Linux Importer Affected by VCID-63g4-j4nd-aaad https://security.archlinux.org/AVG-1911 36.0.0
2025-03-28T07:45:37.147009+00:00 Arch Linux Importer Affected by VCID-dar1-s72w-aaap https://security.archlinux.org/AVG-1911 36.0.0
2025-03-28T07:45:37.128231+00:00 Arch Linux Importer Affected by VCID-v9dw-pa2e-aaaa https://security.archlinux.org/AVG-1911 36.0.0
2025-03-28T07:45:37.109681+00:00 Arch Linux Importer Affected by VCID-88fs-zb4r-aaac https://security.archlinux.org/AVG-1911 36.0.0
2025-03-28T07:45:37.090943+00:00 Arch Linux Importer Affected by VCID-2sjc-drqj-aaaf https://security.archlinux.org/AVG-1911 36.0.0
2025-03-28T07:45:37.072378+00:00 Arch Linux Importer Affected by VCID-t7p1-8mcp-aaaj https://security.archlinux.org/AVG-1911 36.0.0
2025-03-28T07:45:37.053880+00:00 Arch Linux Importer Affected by VCID-ms2c-kqz5-aaas https://security.archlinux.org/AVG-1911 36.0.0
2025-03-28T07:45:37.035159+00:00 Arch Linux Importer Affected by VCID-fp42-vdmb-aaaa https://security.archlinux.org/AVG-1911 36.0.0
2025-03-28T07:45:37.016572+00:00 Arch Linux Importer Affected by VCID-w3f9-2bds-aaah https://security.archlinux.org/AVG-1911 36.0.0
2025-03-28T07:45:36.997973+00:00 Arch Linux Importer Affected by VCID-5ket-3f28-aaan https://security.archlinux.org/AVG-1911 36.0.0
2025-03-28T07:45:36.979387+00:00 Arch Linux Importer Affected by VCID-c6q6-m6rw-aaap https://security.archlinux.org/AVG-1911 36.0.0
2025-03-28T07:45:36.960727+00:00 Arch Linux Importer Affected by VCID-v8mn-cp7h-aaaf https://security.archlinux.org/AVG-1911 36.0.0
2025-03-28T07:45:36.941910+00:00 Arch Linux Importer Affected by VCID-zd9g-egsv-aaap https://security.archlinux.org/AVG-1911 36.0.0
2025-03-28T07:45:36.923153+00:00 Arch Linux Importer Affected by VCID-nfxa-nhgz-aaaf https://security.archlinux.org/AVG-1911 36.0.0
2025-03-28T07:45:36.904524+00:00 Arch Linux Importer Affected by VCID-cjv1-kfbs-aaag https://security.archlinux.org/AVG-1911 36.0.0
2024-09-18T02:00:35.688778+00:00 Arch Linux Importer Affected by VCID-w8z8-chwq-aaap https://security.archlinux.org/AVG-1911 34.0.1
2024-09-18T02:00:35.668667+00:00 Arch Linux Importer Affected by VCID-v95c-2sp9-aaan https://security.archlinux.org/AVG-1911 34.0.1
2024-09-18T02:00:35.648845+00:00 Arch Linux Importer Affected by VCID-rq3j-uyp1-aaah https://security.archlinux.org/AVG-1911 34.0.1
2024-09-18T02:00:35.628879+00:00 Arch Linux Importer Affected by VCID-qzhj-an3g-aaag https://security.archlinux.org/AVG-1911 34.0.1
2024-09-18T02:00:35.600694+00:00 Arch Linux Importer Affected by VCID-63g4-j4nd-aaad https://security.archlinux.org/AVG-1911 34.0.1
2024-09-18T02:00:35.575965+00:00 Arch Linux Importer Affected by VCID-dar1-s72w-aaap https://security.archlinux.org/AVG-1911 34.0.1
2024-09-18T02:00:35.556409+00:00 Arch Linux Importer Affected by VCID-v9dw-pa2e-aaaa https://security.archlinux.org/AVG-1911 34.0.1
2024-09-18T02:00:35.536147+00:00 Arch Linux Importer Affected by VCID-88fs-zb4r-aaac https://security.archlinux.org/AVG-1911 34.0.1
2024-09-18T02:00:35.516832+00:00 Arch Linux Importer Affected by VCID-2sjc-drqj-aaaf https://security.archlinux.org/AVG-1911 34.0.1
2024-09-18T02:00:35.496796+00:00 Arch Linux Importer Affected by VCID-t7p1-8mcp-aaaj https://security.archlinux.org/AVG-1911 34.0.1
2024-09-18T02:00:35.476879+00:00 Arch Linux Importer Affected by VCID-ms2c-kqz5-aaas https://security.archlinux.org/AVG-1911 34.0.1
2024-09-18T02:00:35.457670+00:00 Arch Linux Importer Affected by VCID-fp42-vdmb-aaaa https://security.archlinux.org/AVG-1911 34.0.1
2024-09-18T02:00:35.438168+00:00 Arch Linux Importer Affected by VCID-w3f9-2bds-aaah https://security.archlinux.org/AVG-1911 34.0.1
2024-09-18T02:00:35.417590+00:00 Arch Linux Importer Affected by VCID-5ket-3f28-aaan https://security.archlinux.org/AVG-1911 34.0.1
2024-09-18T02:00:35.397813+00:00 Arch Linux Importer Affected by VCID-c6q6-m6rw-aaap https://security.archlinux.org/AVG-1911 34.0.1
2024-09-18T02:00:35.372384+00:00 Arch Linux Importer Affected by VCID-v8mn-cp7h-aaaf https://security.archlinux.org/AVG-1911 34.0.1
2024-09-18T02:00:35.341054+00:00 Arch Linux Importer Affected by VCID-zd9g-egsv-aaap https://security.archlinux.org/AVG-1911 34.0.1
2024-09-18T02:00:35.311701+00:00 Arch Linux Importer Affected by VCID-nfxa-nhgz-aaaf https://security.archlinux.org/AVG-1911 34.0.1
2024-09-18T02:00:35.292574+00:00 Arch Linux Importer Affected by VCID-cjv1-kfbs-aaag https://security.archlinux.org/AVG-1911 34.0.1
2024-01-03T22:26:52.810251+00:00 Arch Linux Importer Affected by VCID-w8z8-chwq-aaap https://security.archlinux.org/AVG-1911 34.0.0rc1
2024-01-03T22:26:52.788229+00:00 Arch Linux Importer Affected by VCID-v95c-2sp9-aaan https://security.archlinux.org/AVG-1911 34.0.0rc1
2024-01-03T22:26:52.764485+00:00 Arch Linux Importer Affected by VCID-rq3j-uyp1-aaah https://security.archlinux.org/AVG-1911 34.0.0rc1
2024-01-03T22:26:52.742429+00:00 Arch Linux Importer Affected by VCID-qzhj-an3g-aaag https://security.archlinux.org/AVG-1911 34.0.0rc1
2024-01-03T22:26:52.720497+00:00 Arch Linux Importer Affected by VCID-63g4-j4nd-aaad https://security.archlinux.org/AVG-1911 34.0.0rc1
2024-01-03T22:26:52.697014+00:00 Arch Linux Importer Affected by VCID-dar1-s72w-aaap https://security.archlinux.org/AVG-1911 34.0.0rc1
2024-01-03T22:26:52.673070+00:00 Arch Linux Importer Affected by VCID-v9dw-pa2e-aaaa https://security.archlinux.org/AVG-1911 34.0.0rc1
2024-01-03T22:26:52.650749+00:00 Arch Linux Importer Affected by VCID-88fs-zb4r-aaac https://security.archlinux.org/AVG-1911 34.0.0rc1
2024-01-03T22:26:52.629183+00:00 Arch Linux Importer Affected by VCID-2sjc-drqj-aaaf https://security.archlinux.org/AVG-1911 34.0.0rc1
2024-01-03T22:26:52.609547+00:00 Arch Linux Importer Affected by VCID-t7p1-8mcp-aaaj https://security.archlinux.org/AVG-1911 34.0.0rc1
2024-01-03T22:26:52.590093+00:00 Arch Linux Importer Affected by VCID-ms2c-kqz5-aaas https://security.archlinux.org/AVG-1911 34.0.0rc1
2024-01-03T22:26:52.570881+00:00 Arch Linux Importer Affected by VCID-fp42-vdmb-aaaa https://security.archlinux.org/AVG-1911 34.0.0rc1
2024-01-03T22:26:52.551436+00:00 Arch Linux Importer Affected by VCID-w3f9-2bds-aaah https://security.archlinux.org/AVG-1911 34.0.0rc1
2024-01-03T22:26:52.532005+00:00 Arch Linux Importer Affected by VCID-5ket-3f28-aaan https://security.archlinux.org/AVG-1911 34.0.0rc1
2024-01-03T22:26:52.512406+00:00 Arch Linux Importer Affected by VCID-c6q6-m6rw-aaap https://security.archlinux.org/AVG-1911 34.0.0rc1
2024-01-03T22:26:52.492723+00:00 Arch Linux Importer Affected by VCID-v8mn-cp7h-aaaf https://security.archlinux.org/AVG-1911 34.0.0rc1
2024-01-03T22:26:52.473211+00:00 Arch Linux Importer Affected by VCID-zd9g-egsv-aaap https://security.archlinux.org/AVG-1911 34.0.0rc1
2024-01-03T22:26:52.453857+00:00 Arch Linux Importer Affected by VCID-nfxa-nhgz-aaaf https://security.archlinux.org/AVG-1911 34.0.0rc1
2024-01-03T22:26:52.434228+00:00 Arch Linux Importer Affected by VCID-cjv1-kfbs-aaag https://security.archlinux.org/AVG-1911 34.0.0rc1