sa-exim 4.2.1 allows attackers to execute arbitrary code if they can write a .cf file or a rule. This occurs because Greylisting.pm relies on eval (rather than direct parsing and/or use of the taint feature). This issue is similar to CVE-2018-11805.
https://usn.ubuntu.com/4520-1/
https://marc.info/?l=spamassassin-users&m=157668305026635&w=2
https://marc.info/?l=spamassassin-users&m=157668107325768&w=2
https://lists.debian.org/debian-lts-announce/2020/01/msg00006.html
https://bugs.debian.org/946829#24
Source: Mitre, NVD
Published: 2019-12-22
Updated: 2022-12-14
Base Score: 9
Vector: CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:C
Severity: High
Base Score: 8.8
Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS: 0.03328