Exim 4.85 through 4.92 (fixed in 4.92.1) allows remote code execution as root in some unusual configurations that use the ${sort } expansion for items that can be controlled by an attacker (e.g., $local_part or $domain).
https://www.debian.org/security/2019/dsa-4488
https://seclists.org/bugtraq/2019/Jul/51
http://www.openwall.com/lists/oss-security/2019/07/26/5
https://security.gentoo.org/glsa/201909-06
http://exim.org/static/doc/security/CVE-2019-13917.txt
Source: Mitre, NVD
Published: 2019-07-25
Updated: 2019-09-07
Base Score: 10
Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C
Severity: Critical
Base Score: 9.8
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS: 0.20117