The DKIM implementation in Exim 4.7x before 4.76 permits matching for DKIM identities to apply to lookup items, instead of only strings, which allows remote attackers to execute arbitrary code or access a filesystem via a crafted identity.
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: mitre
Published: 2011-05-16T18:00:00
Updated: 2024-08-06T22:28:40.995Z
Reserved: 2011-03-10T00:00:00
Link: CVE-2011-1407
Vulnrichment
No data.
NVD
Status : Modified
Published: 2011-05-16T18:55:00.730
Modified: 2024-11-21T01:26:14.700
Link: CVE-2011-1407
Redhat