{"id":"USN-4934-2","summary":"exim4 vulnerabilities","details":"USN-4934-1 fixed several vulnerabilities in Exim. This update provides\nthe corresponding update for Ubuntu 14.04 ESM and Ubuntu 16.04 ESM.\nCVE-2020-28026 only affected Ubuntu 16.04 ESM.\n\nOriginal advisory details:\n\n It was discovered that Exim contained multiple security issues. An attacker\n could use these issues to cause a denial of service, execute arbitrary\n code remotely, obtain sensitive information, or escalate local privileges.\n","modified":"2026-02-10T04:42:09Z","published":"2021-05-06T11:23:36Z","related":["UBUNTU-CVE-2020-28007","UBUNTU-CVE-2020-28008","UBUNTU-CVE-2020-28009","UBUNTU-CVE-2020-28011","UBUNTU-CVE-2020-28012","UBUNTU-CVE-2020-28013","UBUNTU-CVE-2020-28014","UBUNTU-CVE-2020-28015","UBUNTU-CVE-2020-28017","UBUNTU-CVE-2020-28020","UBUNTU-CVE-2020-28022","UBUNTU-CVE-2020-28024","UBUNTU-CVE-2020-28025","UBUNTU-CVE-2020-28026","UBUNTU-CVE-2021-27216"],"upstream":["CVE-2020-28007","CVE-2020-28008","CVE-2020-28009","CVE-2020-28011","CVE-2020-28012","CVE-2020-28013","CVE-2020-28014","CVE-2020-28015","CVE-2020-28017","CVE-2020-28020","CVE-2020-28022","CVE-2020-28024","CVE-2020-28025","CVE-2020-28026","CVE-2021-27216","UBUNTU-CVE-2020-28007","UBUNTU-CVE-2020-28008","UBUNTU-CVE-2020-28009","UBUNTU-CVE-2020-28011","UBUNTU-CVE-2020-28012","UBUNTU-CVE-2020-28013","UBUNTU-CVE-2020-28014","UBUNTU-CVE-2020-28015","UBUNTU-CVE-2020-28016","UBUNTU-CVE-2020-28017","UBUNTU-CVE-2020-28020","UBUNTU-CVE-2020-28022","UBUNTU-CVE-2020-28024","UBUNTU-CVE-2020-28025","UBUNTU-CVE-2020-28026","UBUNTU-CVE-2021-27216"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-4934-2"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2020-28007"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2020-28008"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2020-28009"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2020-28011"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2020-28012"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2020-28013"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2020-28014"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2020-28015"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2020-28016"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2020-28017"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2020-28020"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2020-28022"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2020-28024"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2020-28025"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2020-28026"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-27216"}],"affected":[{"package":{"name":"exim4","ecosystem":"Ubuntu:Pro:14.04:LTS","purl":"pkg:deb/ubuntu/exim4@4.82-3ubuntu2.4+esm3?arch=source&distro=trusty/esm"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.82-3ubuntu2.4+esm3"}]}],"versions":["4.80-7ubuntu3","4.80-7ubuntu4","4.80-9ubuntu1","4.80-9ubuntu2","4.82-3ubuntu1","4.82-3ubuntu2","4.82-3ubuntu2.1","4.82-3ubuntu2.2","4.82-3ubuntu2.3","4.82-3ubuntu2.4","4.82-3ubuntu2.4+esm1","4.82-3ubuntu2.4+esm2"],"ecosystem_specific":{"availability":"Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro","binaries":[{"binary_name":"exim4","binary_version":"4.82-3ubuntu2.4+esm3"},{"binary_name":"exim4-base","binary_version":"4.82-3ubuntu2.4+esm3"},{"binary_name":"exim4-config","binary_version":"4.82-3ubuntu2.4+esm3"},{"binary_name":"exim4-daemon-heavy","binary_version":"4.82-3ubuntu2.4+esm3"},{"binary_name":"exim4-daemon-light","binary_version":"4.82-3ubuntu2.4+esm3"},{"binary_name":"exim4-dev","binary_version":"4.82-3ubuntu2.4+esm3"},{"binary_name":"eximon4","binary_version":"4.82-3ubuntu2.4+esm3"}]},"database_specific":{"cves_map":{"ecosystem":"Ubuntu:Pro:14.04:LTS","cves":[{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2020-28007"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2020-28008"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2020-28009"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2020-28011"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2020-28012"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2020-28013"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2020-28014"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2020-28015"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2020-28017"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2020-28020"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2020-28022"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2020-28024"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2020-28025"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2020-28026"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2021-27216"}]},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-4934-2.json"}},{"package":{"name":"exim4","ecosystem":"Ubuntu:Pro:16.04:LTS","purl":"pkg:deb/ubuntu/exim4@4.86.2-2ubuntu2.6+esm1?arch=source&distro=esm-infra/xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.86.2-2ubuntu2.6+esm1"}]}],"versions":["4.86-3ubuntu1","4.86-7ubuntu1","4.86-7ubuntu2","4.86-7ubuntu3","4.86.2-2ubuntu1","4.86.2-2ubuntu2","4.86.2-2ubuntu2.1","4.86.2-2ubuntu2.2","4.86.2-2ubuntu2.3","4.86.2-2ubuntu2.4","4.86.2-2ubuntu2.5","4.86.2-2ubuntu2.6"],"ecosystem_specific":{"availability":"Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro","binaries":[{"binary_name":"exim4","binary_version":"4.86.2-2ubuntu2.6+esm1"},{"binary_name":"exim4-base","binary_version":"4.86.2-2ubuntu2.6+esm1"},{"binary_name":"exim4-config","binary_version":"4.86.2-2ubuntu2.6+esm1"},{"binary_name":"exim4-daemon-heavy","binary_version":"4.86.2-2ubuntu2.6+esm1"},{"binary_name":"exim4-daemon-light","binary_version":"4.86.2-2ubuntu2.6+esm1"},{"binary_name":"exim4-dev","binary_version":"4.86.2-2ubuntu2.6+esm1"},{"binary_name":"eximon4","binary_version":"4.86.2-2ubuntu2.6+esm1"}]},"database_specific":{"cves_map":{"ecosystem":"Ubuntu:Pro:16.04:LTS","cves":[{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2020-28007"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2020-28008"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2020-28009"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2020-28011"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2020-28012"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2020-28013"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2020-28014"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2020-28015"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2020-28017"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2020-28020"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2020-28022"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2020-28024"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2020-28025"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2020-28026"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2021-27216"}]},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-4934-2.json"}}],"schema_version":"1.7.3"}