Search for packages
purl | pkg:alpm/archlinux/exim@4.94-3 |
Vulnerability | Summary | Fixed by |
---|---|---|
VCID-2sjc-drqj-aaaf
Aliases: CVE-2020-28015 |
Exim 4 before 4.94.2 has Improper Neutralization of Line Delimiters. Local users can alter the behavior of root processes because a recipient address can have a newline character. |
Affected by 0 other vulnerabilities. |
VCID-5ket-3f28-aaan
Aliases: CVE-2020-28021 |
Exim 4 before 4.94.2 has Improper Neutralization of Line Delimiters. An authenticated remote SMTP client can insert newline characters into a spool file (which indirectly leads to remote code execution as root) via AUTH= in a MAIL FROM command. |
Affected by 0 other vulnerabilities. |
VCID-63g4-j4nd-aaad
Aliases: CVE-2020-28011 |
Exim 4 before 4.94.2 allows Heap-based Buffer Overflow in queue_run via two sender options: -R and -S. This may cause privilege escalation from exim to root. |
Affected by 0 other vulnerabilities. |
VCID-88fs-zb4r-aaac
Aliases: CVE-2020-28014 |
Exim 4 before 4.94.2 allows Execution with Unnecessary Privileges. The -oP option is available to the exim user, and allows a denial of service because root-owned files can be overwritten. |
Affected by 0 other vulnerabilities. |
VCID-c6q6-m6rw-aaap
Aliases: CVE-2020-28022 |
Exim 4 before 4.94.2 has Improper Restriction of Write Operations within the Bounds of a Memory Buffer. This occurs when processing name=value pairs within MAIL FROM and RCPT TO commands. |
Affected by 0 other vulnerabilities. |
VCID-cjv1-kfbs-aaag
Aliases: CVE-2020-28026 |
Exim 4 before 4.94.2 has Improper Neutralization of Line Delimiters, relevant in non-default configurations that enable Delivery Status Notification (DSN). Certain uses of ORCPT= can place a newline into a spool header file, and indirectly allow unauthenticated remote attackers to execute arbitrary commands as root. |
Affected by 0 other vulnerabilities. |
VCID-dar1-s72w-aaap
Aliases: CVE-2020-28012 |
Exim 4 before 4.94.2 allows Exposure of File Descriptor to Unintended Control Sphere because rda_interpret uses a privileged pipe that lacks a close-on-exec flag. |
Affected by 0 other vulnerabilities. |
VCID-fp42-vdmb-aaaa
Aliases: CVE-2020-28018 |
Exim 4 before 4.94.2 allows Use After Free in smtp_reset in certain situations that may be common for builds with OpenSSL. |
Affected by 0 other vulnerabilities. |
VCID-ms2c-kqz5-aaas
Aliases: CVE-2020-28017 |
Exim 4 before 4.94.2 allows Integer Overflow to Buffer Overflow in receive_add_recipient via an e-mail message with fifty million recipients. NOTE: remote exploitation may be difficult because of resource consumption. |
Affected by 0 other vulnerabilities. |
VCID-nfxa-nhgz-aaaf
Aliases: CVE-2020-28025 |
Exim 4 before 4.94.2 allows Out-of-bounds Read because pdkim_finish_bodyhash does not validate the relationship between sig->bodyhash.len and b->bh.len; thus, a crafted DKIM-Signature header might lead to a leak of sensitive information from process memory. |
Affected by 0 other vulnerabilities. |
VCID-qzhj-an3g-aaag
Aliases: CVE-2020-28010 |
Exim 4 before 4.94.2 allows Out-of-bounds Write because the main function, while setuid root, copies the current working directory pathname into a buffer that is too small (on some common platforms). |
Affected by 0 other vulnerabilities. |
VCID-rq3j-uyp1-aaah
Aliases: CVE-2020-28009 |
Exim 4 before 4.94.2 allows Integer Overflow to Buffer Overflow because get_stdinput allows unbounded reads that are accompanied by unbounded increases in a certain size variable. NOTE: exploitation may be impractical because of the execution time needed to overflow (multiple days). |
Affected by 0 other vulnerabilities. |
VCID-t7p1-8mcp-aaaj
Aliases: CVE-2020-28016 |
Exim 4 before 4.94.2 allows an off-by-two Out-of-bounds Write because "-F ''" is mishandled by parse_fix_phrase. |
Affected by 0 other vulnerabilities. |
VCID-v8mn-cp7h-aaaf
Aliases: CVE-2020-28023 |
Exim 4 before 4.94.2 allows Out-of-bounds Read. smtp_setup_msg may disclose sensitive information from process memory to an unauthenticated SMTP client. |
Affected by 0 other vulnerabilities. |
VCID-v95c-2sp9-aaan
Aliases: CVE-2020-28008 |
Exim 4 before 4.94.2 allows Execution with Unnecessary Privileges. Because Exim operates as root in the spool directory (owned by a non-root user), an attacker can write to a /var/spool/exim4/input spool header file, in which a crafted recipient address can indirectly lead to command execution. |
Affected by 0 other vulnerabilities. |
VCID-v9dw-pa2e-aaaa
Aliases: CVE-2020-28013 |
Exim 4 before 4.94.2 allows Heap-based Buffer Overflow because it mishandles "-F '.('" on the command line, and thus may allow privilege escalation from any user to root. This occurs because of the interpretation of negative sizes in strncpy. |
Affected by 0 other vulnerabilities. |
VCID-w3f9-2bds-aaah
Aliases: CVE-2020-28019 |
Exim 4 before 4.94.2 has Improper Initialization that can lead to recursion-based stack consumption or other consequences. This occurs because use of certain getc functions is mishandled when a client uses BDAT instead of DATA. |
Affected by 0 other vulnerabilities. |
VCID-w8z8-chwq-aaap
Aliases: CVE-2020-28007 |
Exim 4 before 4.94.2 allows Execution with Unnecessary Privileges. Because Exim operates as root in the log directory (owned by a non-root user), a symlink or hard link attack allows overwriting critical root-owned files anywhere on the filesystem. |
Affected by 0 other vulnerabilities. |
VCID-zd9g-egsv-aaap
Aliases: CVE-2020-28024 |
Exim 4 before 4.94.2 allows Buffer Underwrite that may result in unauthenticated remote attackers executing arbitrary commands, because smtp_ungetc was only intended to push back characters, but can actually push back non-character error codes such as EOF. |
Affected by 0 other vulnerabilities. |
Vulnerability | Summary | Aliases |
---|---|---|
This package is not known to fix vulnerabilities. |
Date | Actor | Action | Vulnerability | Source | VulnerableCode Version |
---|---|---|---|---|---|
2025-03-28T07:45:37.240780+00:00 | Arch Linux Importer | Affected by | VCID-w8z8-chwq-aaap | https://security.archlinux.org/AVG-1911 | 36.0.0 |
2025-03-28T07:45:37.222207+00:00 | Arch Linux Importer | Affected by | VCID-v95c-2sp9-aaan | https://security.archlinux.org/AVG-1911 | 36.0.0 |
2025-03-28T07:45:37.203363+00:00 | Arch Linux Importer | Affected by | VCID-rq3j-uyp1-aaah | https://security.archlinux.org/AVG-1911 | 36.0.0 |
2025-03-28T07:45:37.184527+00:00 | Arch Linux Importer | Affected by | VCID-qzhj-an3g-aaag | https://security.archlinux.org/AVG-1911 | 36.0.0 |
2025-03-28T07:45:37.165969+00:00 | Arch Linux Importer | Affected by | VCID-63g4-j4nd-aaad | https://security.archlinux.org/AVG-1911 | 36.0.0 |
2025-03-28T07:45:37.147009+00:00 | Arch Linux Importer | Affected by | VCID-dar1-s72w-aaap | https://security.archlinux.org/AVG-1911 | 36.0.0 |
2025-03-28T07:45:37.128231+00:00 | Arch Linux Importer | Affected by | VCID-v9dw-pa2e-aaaa | https://security.archlinux.org/AVG-1911 | 36.0.0 |
2025-03-28T07:45:37.109681+00:00 | Arch Linux Importer | Affected by | VCID-88fs-zb4r-aaac | https://security.archlinux.org/AVG-1911 | 36.0.0 |
2025-03-28T07:45:37.090943+00:00 | Arch Linux Importer | Affected by | VCID-2sjc-drqj-aaaf | https://security.archlinux.org/AVG-1911 | 36.0.0 |
2025-03-28T07:45:37.072378+00:00 | Arch Linux Importer | Affected by | VCID-t7p1-8mcp-aaaj | https://security.archlinux.org/AVG-1911 | 36.0.0 |
2025-03-28T07:45:37.053880+00:00 | Arch Linux Importer | Affected by | VCID-ms2c-kqz5-aaas | https://security.archlinux.org/AVG-1911 | 36.0.0 |
2025-03-28T07:45:37.035159+00:00 | Arch Linux Importer | Affected by | VCID-fp42-vdmb-aaaa | https://security.archlinux.org/AVG-1911 | 36.0.0 |
2025-03-28T07:45:37.016572+00:00 | Arch Linux Importer | Affected by | VCID-w3f9-2bds-aaah | https://security.archlinux.org/AVG-1911 | 36.0.0 |
2025-03-28T07:45:36.997973+00:00 | Arch Linux Importer | Affected by | VCID-5ket-3f28-aaan | https://security.archlinux.org/AVG-1911 | 36.0.0 |
2025-03-28T07:45:36.979387+00:00 | Arch Linux Importer | Affected by | VCID-c6q6-m6rw-aaap | https://security.archlinux.org/AVG-1911 | 36.0.0 |
2025-03-28T07:45:36.960727+00:00 | Arch Linux Importer | Affected by | VCID-v8mn-cp7h-aaaf | https://security.archlinux.org/AVG-1911 | 36.0.0 |
2025-03-28T07:45:36.941910+00:00 | Arch Linux Importer | Affected by | VCID-zd9g-egsv-aaap | https://security.archlinux.org/AVG-1911 | 36.0.0 |
2025-03-28T07:45:36.923153+00:00 | Arch Linux Importer | Affected by | VCID-nfxa-nhgz-aaaf | https://security.archlinux.org/AVG-1911 | 36.0.0 |
2025-03-28T07:45:36.904524+00:00 | Arch Linux Importer | Affected by | VCID-cjv1-kfbs-aaag | https://security.archlinux.org/AVG-1911 | 36.0.0 |
2024-09-18T02:00:35.688778+00:00 | Arch Linux Importer | Affected by | VCID-w8z8-chwq-aaap | https://security.archlinux.org/AVG-1911 | 34.0.1 |
2024-09-18T02:00:35.668667+00:00 | Arch Linux Importer | Affected by | VCID-v95c-2sp9-aaan | https://security.archlinux.org/AVG-1911 | 34.0.1 |
2024-09-18T02:00:35.648845+00:00 | Arch Linux Importer | Affected by | VCID-rq3j-uyp1-aaah | https://security.archlinux.org/AVG-1911 | 34.0.1 |
2024-09-18T02:00:35.628879+00:00 | Arch Linux Importer | Affected by | VCID-qzhj-an3g-aaag | https://security.archlinux.org/AVG-1911 | 34.0.1 |
2024-09-18T02:00:35.600694+00:00 | Arch Linux Importer | Affected by | VCID-63g4-j4nd-aaad | https://security.archlinux.org/AVG-1911 | 34.0.1 |
2024-09-18T02:00:35.575965+00:00 | Arch Linux Importer | Affected by | VCID-dar1-s72w-aaap | https://security.archlinux.org/AVG-1911 | 34.0.1 |
2024-09-18T02:00:35.556409+00:00 | Arch Linux Importer | Affected by | VCID-v9dw-pa2e-aaaa | https://security.archlinux.org/AVG-1911 | 34.0.1 |
2024-09-18T02:00:35.536147+00:00 | Arch Linux Importer | Affected by | VCID-88fs-zb4r-aaac | https://security.archlinux.org/AVG-1911 | 34.0.1 |
2024-09-18T02:00:35.516832+00:00 | Arch Linux Importer | Affected by | VCID-2sjc-drqj-aaaf | https://security.archlinux.org/AVG-1911 | 34.0.1 |
2024-09-18T02:00:35.496796+00:00 | Arch Linux Importer | Affected by | VCID-t7p1-8mcp-aaaj | https://security.archlinux.org/AVG-1911 | 34.0.1 |
2024-09-18T02:00:35.476879+00:00 | Arch Linux Importer | Affected by | VCID-ms2c-kqz5-aaas | https://security.archlinux.org/AVG-1911 | 34.0.1 |
2024-09-18T02:00:35.457670+00:00 | Arch Linux Importer | Affected by | VCID-fp42-vdmb-aaaa | https://security.archlinux.org/AVG-1911 | 34.0.1 |
2024-09-18T02:00:35.438168+00:00 | Arch Linux Importer | Affected by | VCID-w3f9-2bds-aaah | https://security.archlinux.org/AVG-1911 | 34.0.1 |
2024-09-18T02:00:35.417590+00:00 | Arch Linux Importer | Affected by | VCID-5ket-3f28-aaan | https://security.archlinux.org/AVG-1911 | 34.0.1 |
2024-09-18T02:00:35.397813+00:00 | Arch Linux Importer | Affected by | VCID-c6q6-m6rw-aaap | https://security.archlinux.org/AVG-1911 | 34.0.1 |
2024-09-18T02:00:35.372384+00:00 | Arch Linux Importer | Affected by | VCID-v8mn-cp7h-aaaf | https://security.archlinux.org/AVG-1911 | 34.0.1 |
2024-09-18T02:00:35.341054+00:00 | Arch Linux Importer | Affected by | VCID-zd9g-egsv-aaap | https://security.archlinux.org/AVG-1911 | 34.0.1 |
2024-09-18T02:00:35.311701+00:00 | Arch Linux Importer | Affected by | VCID-nfxa-nhgz-aaaf | https://security.archlinux.org/AVG-1911 | 34.0.1 |
2024-09-18T02:00:35.292574+00:00 | Arch Linux Importer | Affected by | VCID-cjv1-kfbs-aaag | https://security.archlinux.org/AVG-1911 | 34.0.1 |
2024-01-03T22:26:52.810251+00:00 | Arch Linux Importer | Affected by | VCID-w8z8-chwq-aaap | https://security.archlinux.org/AVG-1911 | 34.0.0rc1 |
2024-01-03T22:26:52.788229+00:00 | Arch Linux Importer | Affected by | VCID-v95c-2sp9-aaan | https://security.archlinux.org/AVG-1911 | 34.0.0rc1 |
2024-01-03T22:26:52.764485+00:00 | Arch Linux Importer | Affected by | VCID-rq3j-uyp1-aaah | https://security.archlinux.org/AVG-1911 | 34.0.0rc1 |
2024-01-03T22:26:52.742429+00:00 | Arch Linux Importer | Affected by | VCID-qzhj-an3g-aaag | https://security.archlinux.org/AVG-1911 | 34.0.0rc1 |
2024-01-03T22:26:52.720497+00:00 | Arch Linux Importer | Affected by | VCID-63g4-j4nd-aaad | https://security.archlinux.org/AVG-1911 | 34.0.0rc1 |
2024-01-03T22:26:52.697014+00:00 | Arch Linux Importer | Affected by | VCID-dar1-s72w-aaap | https://security.archlinux.org/AVG-1911 | 34.0.0rc1 |
2024-01-03T22:26:52.673070+00:00 | Arch Linux Importer | Affected by | VCID-v9dw-pa2e-aaaa | https://security.archlinux.org/AVG-1911 | 34.0.0rc1 |
2024-01-03T22:26:52.650749+00:00 | Arch Linux Importer | Affected by | VCID-88fs-zb4r-aaac | https://security.archlinux.org/AVG-1911 | 34.0.0rc1 |
2024-01-03T22:26:52.629183+00:00 | Arch Linux Importer | Affected by | VCID-2sjc-drqj-aaaf | https://security.archlinux.org/AVG-1911 | 34.0.0rc1 |
2024-01-03T22:26:52.609547+00:00 | Arch Linux Importer | Affected by | VCID-t7p1-8mcp-aaaj | https://security.archlinux.org/AVG-1911 | 34.0.0rc1 |
2024-01-03T22:26:52.590093+00:00 | Arch Linux Importer | Affected by | VCID-ms2c-kqz5-aaas | https://security.archlinux.org/AVG-1911 | 34.0.0rc1 |
2024-01-03T22:26:52.570881+00:00 | Arch Linux Importer | Affected by | VCID-fp42-vdmb-aaaa | https://security.archlinux.org/AVG-1911 | 34.0.0rc1 |
2024-01-03T22:26:52.551436+00:00 | Arch Linux Importer | Affected by | VCID-w3f9-2bds-aaah | https://security.archlinux.org/AVG-1911 | 34.0.0rc1 |
2024-01-03T22:26:52.532005+00:00 | Arch Linux Importer | Affected by | VCID-5ket-3f28-aaan | https://security.archlinux.org/AVG-1911 | 34.0.0rc1 |
2024-01-03T22:26:52.512406+00:00 | Arch Linux Importer | Affected by | VCID-c6q6-m6rw-aaap | https://security.archlinux.org/AVG-1911 | 34.0.0rc1 |
2024-01-03T22:26:52.492723+00:00 | Arch Linux Importer | Affected by | VCID-v8mn-cp7h-aaaf | https://security.archlinux.org/AVG-1911 | 34.0.0rc1 |
2024-01-03T22:26:52.473211+00:00 | Arch Linux Importer | Affected by | VCID-zd9g-egsv-aaap | https://security.archlinux.org/AVG-1911 | 34.0.0rc1 |
2024-01-03T22:26:52.453857+00:00 | Arch Linux Importer | Affected by | VCID-nfxa-nhgz-aaaf | https://security.archlinux.org/AVG-1911 | 34.0.0rc1 |
2024-01-03T22:26:52.434228+00:00 | Arch Linux Importer | Affected by | VCID-cjv1-kfbs-aaag | https://security.archlinux.org/AVG-1911 | 34.0.0rc1 |