vulnerability
FreeBSD: VID-61DB9B88-D091-11E9-8D41-97657151F8C2: Exim -- RCE with root privileges in TLS SNI handler
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 8 | (AV:N/AC:L/Au:N/C:C/I:N/A:N) | Sep 2, 2019 | Sep 7, 2019 | Feb 19, 2025 |
Severity
8
CVSS
(AV:N/AC:L/Au:N/C:C/I:N/A:N)
Published
Sep 2, 2019
Added
Sep 7, 2019
Modified
Feb 19, 2025
Description
Exim developers report:
If your Exim server accepts TLS connections, it is vulnerable. This does
not depend on the TLS libray, so both, GnuTLS and OpenSSL are affected.
The vulnerability is exploitable by sending a SNI ending in a
backslash-null sequence during the initial TLS handshake. The exploit
exists as a POC. For more details see the document qualys.mbx
Solution
freebsd-upgrade-package-exim
References
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.