PatchSiren

Exim CVE debriefs

These pages are published after PatchSiren validates generated defensive summaries against stored public CVE and source evidence.

Known exploited Exim CVE published 2022-03-25

CVE-2010-4345

CVE-2010-4345 is an Exim privilege escalation vulnerability that CISA has listed in its Known Exploited Vulnerabilities catalog. The KEV entry indicates this issue is considered actively exploited or of confirmed exploitation concern, so Exim deployments should be treated as urgent patch candidates. CISA’s guidance is to apply updates per vendor instructions.

Known exploited Exim CVE published 2022-03-25

CVE-2010-4344

CVE-2010-4344 is identified by CISA as an Exim heap-based buffer overflow vulnerability and is included in the Known Exploited Vulnerabilities catalog. The supplied CISA entry was published on 2022-03-25 and sets a remediation due date of 2022-04-15, with the required action to apply updates per vendor instructions. Because this vulnerability is listed as known exploited, defenders should treat remediatio [truncated]

Known exploited Exim CVE published 2022-03-03

CVE-2019-16928

CVE-2019-16928 is an out-of-bounds write vulnerability in Exim Internet Mailer. CISA included it in the Known Exploited Vulnerabilities catalog on 2022-03-03 and set a remediation due date of 2022-03-17, which makes this a high-priority patching item for any environment running Exim.

Known exploited Exim CVE published 2022-01-10

CVE-2019-10149

CVE-2019-10149 is a security issue in Exim Mail Transfer Agent (MTA) described as improper input validation. CISA has included it in the Known Exploited Vulnerabilities catalog, which means it should be treated as a priority issue for defenders, especially on systems exposed to untrusted network traffic. The available source corpus does not provide deeper technical detail, so the safest response is to ver [truncated]

Known exploited Exim CVE published 2021-11-03

CVE-2018-6789

CVE-2018-6789 is an Exim buffer overflow vulnerability that CISA has placed in its Known Exploited Vulnerabilities catalog. The KEV entry indicates known exploitation and also marks the issue as having known ransomware campaign use, which makes it a high-priority item for defenders even without additional product details in the source corpus.