Exim before 4.86.2, when installed setuid root, allows local users to gain privileges via the perl_startup argument.
Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.
Link | Tags |
---|---|
http://www.debian.org/security/2016/dsa-3517 | vendor advisory |
https://www.exploit-db.com/exploits/39535/ | exploit |
http://www.securitytracker.com/id/1035512 | vdb entry |
http://packetstormsecurity.com/files/136124/Exim-4.84-3-Local-Root-Privilege-Escalation.html | exploit |
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00026.html | vendor advisory |
https://www.exploit-db.com/exploits/39702/ | exploit |
http://www.ubuntu.com/usn/USN-2933-1 | vendor advisory |
http://www.exim.org/static/doc/CVE-2016-1531.txt | third party advisory us government resource |
http://www.rapid7.com/db/modules/exploit/unix/local/exim_perl_startup | |
https://www.exploit-db.com/exploits/39549/ | exploit |