CVE-2019-10149
critical-risk
Published 2019-06-05
A flaw was found in Exim versions 4.87 to 4.91 (inclusive). Improper validation of recipient address in deliver_message() function in /src/deliver.c may lead to remote command execution.
Do I need to act?
!
93.9% chance of exploitation in next 30 days
EPSS score — higher than 6% of all CVEs
!
CISA KEV: actively exploited in the wild
On the Known Exploited Vulnerabilities catalog — federal agencies must patch
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
9
CVSS 9.8/10
Critical
NETWORK
/ LOW complexity
Affected Products (4)
References (41)
Mailing List
http://seclists.org/fulldisclosure/2019/Jun/16
Broken Link
http://www.securityfocus.com/bid/108679
Issue Tracking
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10149
Mailing List
https://seclists.org/bugtraq/2019/Jun/5
Third Party Advisory
https://security.gentoo.org/glsa/201906-01
Third Party Advisory
https://usn.ubuntu.com/4010-1/
Third Party Advisory
https://www.debian.org/security/2019/dsa-4456
Vendor Advisory
https://www.exim.org/static/doc/security/CVE-2019-10149.txt
and 21 more references
76
/ 100
critical-risk
Severity
32/34 · Critical
Exploitability
34/34 · Critical
Exposure
10/34 · Low