mirror of
https://git.FreeBSD.org/ports.git
synced 2024-12-13 03:03:15 +00:00
Document Exim RCE CVE-2019-10149
This commit is contained in:
parent
00d331568f
commit
b294778455
Notes:
svn2git
2021-03-31 03:12:20 +00:00
svn path=/head/; revision=503577
@ -58,6 +58,46 @@ Notes:
|
||||
* Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
|
||||
-->
|
||||
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
|
||||
<vuln vid="45bea6b5-8855-11e9-8d41-97657151f8c2">
|
||||
<topic>Exim -- RCE in deliver_message() function</topic>
|
||||
<affects>
|
||||
<package>
|
||||
<name>exim</name>
|
||||
<range><ge>4.87</ge><lt>4.92</lt></range>
|
||||
</package>
|
||||
</affects>
|
||||
<description>
|
||||
<body xmlns="http://www.w3.org/1999/xhtml">
|
||||
<p>Exim team and Qualys report:</p>
|
||||
<blockquote cite="https://www.exim.org/static/doc/security/CVE-2019-10149.txt">
|
||||
<p>
|
||||
We received a report of a possible remote exploit. Currently there is no evidence of an active use of this exploit.
|
||||
</p>
|
||||
<p>
|
||||
A patch exists already, is being tested, and backported to all
|
||||
versions we released since (and including) 4.87.
|
||||
</p>
|
||||
<p>
|
||||
The severity depends on your configuration. It depends on how close to
|
||||
the standard configuration your Exim runtime configuration is. The
|
||||
closer the better.
|
||||
</p>
|
||||
<p>
|
||||
Exim 4.92 is not vulnerable.
|
||||
</p>
|
||||
</blockquote>
|
||||
</body>
|
||||
</description>
|
||||
<references>
|
||||
<cvename>CVE-2019-10149</cvename>
|
||||
<url>https://www.exim.org/static/doc/security/CVE-2019-10149.txt</url>
|
||||
</references>
|
||||
<dates>
|
||||
<discovery>2019-05-27</discovery>
|
||||
<entry>2019-06-06</entry>
|
||||
</dates>
|
||||
</vuln>
|
||||
|
||||
<vuln vid="ffc73e87-87f0-11e9-ad56-fcaa147e860e">
|
||||
<topic>Django -- AdminURLFieldWidget XSS</topic>
|
||||
<affects>
|
||||
|
Loading…
Reference in New Issue
Block a user