Home    |    View Topics    |    Search    |    Contact Us    |   



Category:   Application (E-mail Server)  >   Exim Vendors:
Exim Perl Environment Processing Flaw Lets Local Users Obtain Root Privileges
SecurityTracker Alert ID:  1035512
SecurityTracker URL:
CVE Reference:   CVE-2016-1531   (Links to External Site)
Date:  Apr 8 2016
Impact:   Root access via local system
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): prior to 4.86.2
Description:   A vulnerability was reported in Exim. A local user can obtain root privileges on the target system.

A local user can modify the perl environment and then start Exim to execute arbitrary commands on the target system with root privileges.

Systems with Exim configured with set user id (setuid) root user privileges and using 'perl_startup' are affected.

A demonstration exploit is available at:

Hacker Fantastic reported this vulnerability.

Impact:   A local user can obtain root privileges on the target system.
Solution:   The vendor has issued a fix (4.86.2).

The vendor's advisory is available at:

Vendor URL: (Links to External Site)
Cause:   Access control error
Underlying OS:  Linux (Any), UNIX (Any)

Message History:   None.

 Source Message Contents

[Original Message Not Available for Viewing]

Go to the Top of This SecurityTracker Archive Page

Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, LLC