diff options
author | Vsevolod Stakhov <vsevolod@FreeBSD.org> | 2019-07-26 08:52:48 +0000 |
---|---|---|
committer | Vsevolod Stakhov <vsevolod@FreeBSD.org> | 2019-07-26 08:52:48 +0000 |
commit | 3e7af2cca74fcc138ee86f07806afb55f05686cd (patch) | |
tree | f7fe8231b22eb44261cc77ca4098b215b89cd41b /security | |
parent | 435407595b12994b746b18994e9ac245eef9d8c6 (diff) | |
download | ports-3e7af2cca74fcc138ee86f07806afb55f05686cd.tar.gz ports-3e7af2cca74fcc138ee86f07806afb55f05686cd.zip |
Notes
Diffstat (limited to 'security')
-rw-r--r-- | security/vuxml/vuln.xml | 39 |
1 files changed, 39 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index d78419f98a15..601b7b5013d1 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -58,6 +58,45 @@ Notes: * Do not forget port variants (linux-f10-libxml2, libxml2, etc.) --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="3e0da406-aece-11e9-8d41-97657151f8c2"> + <topic>Exim -- RCE in ${sort} expansion</topic> + <affects> + <package> + <name>exim</name> + <range><ge>4.85</ge><le>4.92</le></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Exim team report:</p> + <blockquote cite="https://www.exim.org/static/doc/security/CVE-2019-13917.txt"> + <p> + A local or remote attacker can execute programs with root privileges - if you've an unusual configuration. + </p> + <p> + If your configuration uses the ${sort } expansion for items that can be controlled by an attacker (e.g. $local_part, $domain). The default config, as shipped by the Exim developers, does not contain ${sort }. + </p> + <p> + The vulnerability is exploitable either remotely or locally and could +be used to execute other programs with root privilege. The ${sort } +expansion re-evaluates its items. + </p> + <p> + Exim 4.92.1 is not vulnerable. + </p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2019-13917</cvename> + <url>https://www.exim.org/static/doc/security/CVE-2019-13917.txt</url> + </references> + <dates> + <discovery>2019-07-18</discovery> + <entry>2019-07-25</entry> + </dates> + </vuln> + <vuln vid="198e6220-ac8b-11e9-a1c7-b499baebfeaf"> <topic>MySQL -- Multiple vulerabilities</topic> <affects> |