CVE-2011-1407
Published May 16, 2011
Last updated 13 years ago
Overview
- Description
- The DKIM implementation in Exim 4.7x before 4.76 permits matching for DKIM identities to apply to lookup items, instead of only strings, which allows remote attackers to execute arbitrary code or access a filesystem via a crafted identity.
- Source
- cve@mitre.org
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 7.5
- Impact score
- 6.4
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:P/I:P/A:P
Weaknesses
- nvd@nist.gov
- CWE-20
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:exim:exim:4.70:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "452E9C94-B7FF-40A9-A7F9-FC38824F6135" }, { "criteria": "cpe:2.3:a:exim:exim:4.71:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A8EB3709-D51F-46D1-99B8-CFB4C2275077" }, { "criteria": "cpe:2.3:a:exim:exim:4.72:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CBDB2156-072B-4392-9DC8-266FF1B8C7A4" }, { "criteria": "cpe:2.3:a:exim:exim:4.73:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "02F8A053-4578-4C45-A193-C188E45ED010" }, { "criteria": "cpe:2.3:a:exim:exim:4.74:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A5DC11D6-F67F-40A8-B8BF-2E76DD2F9091" }, { "criteria": "cpe:2.3:a:exim:exim:4.75:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5854CAF2-1587-4B91-9F9B-E2C57C22C426" } ], "operator": "OR" } ] } ]