This is a summary of the AI-generated 10-question deep analysis. The full version (longer answers, follow-up Q&A, related CVEs) requires login. Read the full analysis β
Q1What is this vulnerability? (Essence + Consequences)
π¨ **What is this vulnerability?** * **Essence:** A critical **SQL Injection (SQLi)** flaw in Exim MTA. * **Trigger:** Occurs when using **SQLite** as the DBM backend + **ETRN** command. * **Consequences:** Remote β¦
π‘οΈ **Root Cause? (CWE/Flaw)** * **CWE ID:** **CWE-89** (Improper Neutralization of Special Elements used in an SQL Command). * **The Flaw:** Parameters passed to SQLite are **not properly sanitized** before executioβ¦
π’ **Who is affected? (Versions/Components)** * **Vendor:** **Exim** (Open-source Mail Transfer Agent). * **Affected Versions:** **Exim 4.98.1 and earlier**.β¦
π **How to self-check? (Features/Scanning)** * **Check Version:** Run `exim -bV`. If version < **4.98.2**, you are vulnerable. π * **Check Config:** Look for `dbdriver = sqlite` in your Exim configuration.β¦
β **Is it fixed officially? (Patch/Mitigation)** * **Yes.** The vulnerability was published on **2025-02-21**. π * **Fix:** Upgrade to **Exim 4.98.2** or later.β¦