Summary
The remote host is missing an update to exim
announced via advisory DSA 097-1.
Solution
https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20097-1
Insight
Patrice Fournier discovered a bug in all versions of Exim older than Exim 3.34 and Exim 3.952.
The Exim maintainer, Philip Hazel, writes about this issue: The problem exists only in the case of a run time configuration which directs or routes an address to a pipe transport without checking the local part of the address in any way. This does not apply, for example, to pipes run from alias or forward files, because the local part is checked to ensure that it is the name of an alias or of a local user. The bug's effect is that, instead of obeying the correct pipe command, a broken Exim runs the command encoded in the local part of the address.
This problem has been fixed in Exim version 3.12-10.2 for the stable distribution Debian GNU/Linux 2.2 and 3.33-1.1 for the testing and unstable distribution. We recommend that you upgrade your exim
Severity
Classification
-
CVE CVE-2001-0889 -
CVSS Base Score: 7.5
AV:N/AC:L/Au:N/C:P/I:P/A:P
Related Vulnerabilities