The DKIM implementation in Exim 4.7x before 4.76 permits matching for DKIM identities to apply to lookup items, instead of only strings, which allows remote attackers to execute arbitrary code or access a filesystem via a crafted identity.
Metrics
Affected Vendors & Products
References
History
No history.

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-06T22:28:40.995Z
Reserved: 2011-03-10T00:00:00
Link: CVE-2011-1407

No data.

Status : Modified
Published: 2011-05-16T18:55:00.730
Modified: 2024-11-21T01:26:14.700
Link: CVE-2011-1407
