CVE-2016-1531

Published on: 04/07/2016 12:00:00 AM UTC

Last Modified on: 03/23/2021 11:27:04 PM UTC

CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

Certain versions of Exim from Exim contain the following vulnerability:

Exim before 4.86.2, when installed setuid root, allows local users to gain privileges via the perl_startup argument.

  • CVE-2016-1531 has been assigned by URL Logo [email protected] to track the vulnerability - currently rated as HIGH severity.

CVSS3 Score: 7 - HIGH

Attack
Vector
Attack
Complexity
Privileges
Required
User
Interaction
LOCAL HIGH LOW NONE
Scope Confidentiality
Impact
Integrity
Impact
Availability
Impact
UNCHANGED HIGH HIGH HIGH

CVSS2 Score: 6.9 - MEDIUM

Access
Vector
Access
Complexity
Authentication
LOCAL MEDIUM NONE
Confidentiality
Impact
Integrity
Impact
Availability
Impact
COMPLETE COMPLETE COMPLETE

CVE References

Description Tags Link
Exim - 'perl_startup' Privilege Escalation (Metasploit) www.exploit-db.com
Proof of Concept
text/html
URL Logo EXPLOIT-DB 39702
Exim <= 4.84-3 - Local Root Exploit Exploit
www.exploit-db.com
Proof of Concept
text/html
URL Logo EXPLOIT-DB 39535
Exim 4.84-3 Local Root / Privilege Escalation ≈ Packet Storm Exploit
packetstormsecurity.com
text/html
URL Logo MISC packetstormsecurity.com/files/136124/Exim-4.84-3-Local-Root-Privilege-Escalation.html
Exim "perl_startup" Privilege Escalation www.rapid7.com
text/html
URL Logo MISC www.rapid7.com/db/modules/exploit/unix/local/exim_perl_startup
Exim < 4.86.2 - Local Privilege Escalation www.exploit-db.com
Proof of Concept
text/html
URL Logo EXPLOIT-DB 39549
[security-announce] openSUSE-SU-2016:0721-1: important: Security update lists.opensuse.org
text/html
URL Logo SUSE openSUSE-SU-2016:0721
USN-2933-1: Exim vulnerabilities | Ubuntu www.ubuntu.com
text/html
URL Logo UBUNTU USN-2933-1
Debian -- Security Information -- DSA-3517-1 exim4 www.debian.org
Depreciated Link
text/html
URL Logo DEBIAN DSA-3517
Third Party Advisory
US Government Resource
www.exim.org
text/plain
URL Logo CONFIRM www.exim.org/static/doc/CVE-2016-1531.txt
Exim Perl Environment Processing Flaw Lets Local Users Obtain Root Privileges - SecurityTracker www.securitytracker.com
text/html
URL Logo SECTRACK 1035512

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
ApplicationEximEximAllAllAllAll
  • cpe:2.3:a:exim:exim:*:*:*:*:*:*:*:*: