The DKIM implementation in Exim 4.7x before 4.76 permits matching for DKIM identities to apply to lookup items, instead of only strings, which allows remote attackers to execute arbitrary code or access a filesystem via a crafted identity.
References
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2011-05-16T18:00:00
Updated: 2011-09-07T09:00:00
Reserved: 2011-03-10T00:00:00
Link: CVE-2011-1407
JSON object: View
NVD Information
Status : Modified
Published: 2011-05-16T18:55:00.730
Modified: 2011-09-07T03:15:53.893
Link: CVE-2011-1407
JSON object: View
Redhat Information
No data.
CWE