Format string vulnerability in daemon.c for Exim 4.x through 4.10, and 3.x through 3.36, allows exim administrative users to execute arbitrary code by modifying the pid_file_path value.
References
Configurations
Configuration 1 (hide)
|
History
20 Nov 2024, 23:41
Type | Values Removed | Values Added |
---|---|---|
References | () http://groups.yahoo.com/group/exim-users/message/42358 - Exploit, Patch, Vendor Advisory | |
References | () http://marc.info/?l=bugtraq&m=103903403527788&w=2 - | |
References | () http://marc.info/?l=bugtraq&m=104006219018664&w=2 - | |
References | () http://www.exim.org/pipermail/exim-users/Week-of-Mon-20021202/046978.html - | |
References | () http://www.securityfocus.com/bid/6314 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/10761 - |
Information
Published : 2002-12-23 05:00
Updated : 2025-04-03 01:03
NVD link : CVE-2002-1381
Mitre link : CVE-2002-1381
CVE.ORG link : CVE-2002-1381
JSON object : View
Products Affected
university_of_cambridge
- exim
CWE