A flaw was found in Exim versions 4.87 to 4.91 (inclusive). Improper validation of recipient address in deliver_message() function in /src/deliver.c may lead to remote command execution.
https://www.exim.org/static/doc/security/CVE-2019-10149.txt
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10149
https://usn.ubuntu.com/4010-1/
http://www.openwall.com/lists/oss-security/2019/06/05/3
http://www.openwall.com/lists/oss-security/2019/06/05/2
http://www.openwall.com/lists/oss-security/2019/06/05/4
https://www.debian.org/security/2019/dsa-4456
https://seclists.org/bugtraq/2019/Jun/5
https://security.gentoo.org/glsa/201906-01
http://www.openwall.com/lists/oss-security/2019/06/06/1
http://www.securityfocus.com/bid/108679
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00020.html
http://packetstormsecurity.com/files/153218/Exim-4.9.1-Remote-Command-Execution.html
http://seclists.org/fulldisclosure/2019/Jun/16
http://packetstormsecurity.com/files/153312/Exim-4.91-Local-Privilege-Escalation.html
http://www.openwall.com/lists/oss-security/2019/07/25/6
http://www.openwall.com/lists/oss-security/2019/07/25/7
http://www.openwall.com/lists/oss-security/2019/07/26/4
http://packetstormsecurity.com/files/154198/Exim-4.91-Local-Privilege-Escalation.html
Source: MITRE
Published: 2019-06-05
Updated: 2022-11-07
Type: CWE-78
Base Score: 10
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
Impact Score: 10
Exploitability Score: 10
Severity: HIGH
Base Score: 9.8
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Impact Score: 5.9
Exploitability Score: 3.9
Severity: CRITICAL