Lucene search

K
ubuntucveUbuntu.comUB:CVE-2020-28008
HistoryMay 04, 2021 - 12:00 a.m.

CVE-2020-28008

2021-05-0400:00:00
ubuntu.com
ubuntu.com
39
exim
privilege escalation
crafted recipient address
command execution
cve-2020-28008
unix

CVSS2

7.2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

EPSS

0

Percentile

12.6%

Exim 4 before 4.94.2 allows Execution with Unnecessary Privileges. Because
Exim operates as root in the spool directory (owned by a non-root user), an
attacker can write to a /var/spool/exim4/input spool header file, in which
a crafted recipient address can indirectly lead to command execution.

OSVersionArchitecturePackageVersionFilename
ubuntu18.04noarchexim4<Β 4.90.1-1ubuntu1.8UNKNOWN
ubuntu20.04noarchexim4<Β 4.93-13ubuntu1.5UNKNOWN
ubuntu20.10noarchexim4<Β 4.94-7ubuntu1.2UNKNOWN
ubuntu21.04noarchexim4<Β 4.94-15ubuntu1.2UNKNOWN
ubuntu21.10noarchexim4<Β 4.94-15ubuntu1.2UNKNOWN
ubuntu22.04noarchexim4<Β 4.94-15ubuntu1.2UNKNOWN
ubuntu14.04noarchexim4<Β 4.82-3ubuntu2.4+esm3UNKNOWN
ubuntu16.04noarchexim4<Β 4.86.2-2ubuntu2.6+esm1UNKNOWN

CVSS2

7.2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

EPSS

0

Percentile

12.6%