1
0
mirror of https://git.FreeBSD.org/ports.git synced 2024-12-13 03:03:15 +00:00

Document Exim RCE CVE-2019-10149

This commit is contained in:
Vsevolod Stakhov 2019-06-06 12:26:54 +00:00
parent 00d331568f
commit b294778455
Notes: svn2git 2021-03-31 03:12:20 +00:00
svn path=/head/; revision=503577

View File

@ -58,6 +58,46 @@ Notes:
* Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
<vuln vid="45bea6b5-8855-11e9-8d41-97657151f8c2">
<topic>Exim -- RCE in deliver_message() function</topic>
<affects>
<package>
<name>exim</name>
<range><ge>4.87</ge><lt>4.92</lt></range>
</package>
</affects>
<description>
<body xmlns="http://www.w3.org/1999/xhtml">
<p>Exim team and Qualys report:</p>
<blockquote cite="https://www.exim.org/static/doc/security/CVE-2019-10149.txt">
<p>
We received a report of a possible remote exploit. Currently there is no evidence of an active use of this exploit.
</p>
<p>
A patch exists already, is being tested, and backported to all
versions we released since (and including) 4.87.
</p>
<p>
The severity depends on your configuration. It depends on how close to
the standard configuration your Exim runtime configuration is. The
closer the better.
</p>
<p>
Exim 4.92 is not vulnerable.
</p>
</blockquote>
</body>
</description>
<references>
<cvename>CVE-2019-10149</cvename>
<url>https://www.exim.org/static/doc/security/CVE-2019-10149.txt</url>
</references>
<dates>
<discovery>2019-05-27</discovery>
<entry>2019-06-06</entry>
</dates>
</vuln>
<vuln vid="ffc73e87-87f0-11e9-ad56-fcaa147e860e">
<topic>Django -- AdminURLFieldWidget XSS</topic>
<affects>