Lucene search

K
freebsdFreeBSD7D09B9EE-E0BA-11E5-ABC4-6FB07AF136D2
HistoryFeb 26, 2016 - 12:00 a.m.

exim -- local privillege escalation

2016-02-2600:00:00
vuxml.freebsd.org
21

6.9 Medium

CVSS2

Attack Vector

LOCAL

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:M/Au:N/C:C/I:C/A:C

7 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

0.001 Low

EPSS

Percentile

24.1%

The Exim development team reports:

All installations having Exim set-uid root and using ‘perl_startup’ are
vulnerable to a local privilege escalation. Any user who can start an
instance of Exim (and this is normally any user) can gain root
privileges. If you do not use ‘perl_startup’ you should be safe.

OSVersionArchitecturePackageVersionFilename
FreeBSDanynoarchexim< 4.86.2UNKNOWN

6.9 Medium

CVSS2

Attack Vector

LOCAL

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:M/Au:N/C:C/I:C/A:C

7 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

0.001 Low

EPSS

Percentile

24.1%