vulnerability
FreeBSD: VID-61db9b88-d091-11e9-8d41-97657151f8c2: Exim -- RCE with root privileges in TLS SNI handler
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 8 | (AV:N/AC:L/Au:N/C:C/I:N/A:N) | Sep 6, 2019 | Sep 7, 2019 | Dec 10, 2025 |
Severity
8
CVSS
(AV:N/AC:L/Au:N/C:C/I:N/A:N)
Published
Sep 6, 2019
Added
Sep 7, 2019
Modified
Dec 10, 2025
Description
Exim developers report: If your Exim server accepts TLS connections, it is vulnerable. This does not depend on the TLS libray, so both, GnuTLS and OpenSSL are affected. The vulnerability is exploitable by sending a SNI ending in a backslash-null sequence during the initial TLS handshake. The exploit exists as a POC. For more details see the document qualys.mbx
Solution
freebsd-upgrade-package-exim
References
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.