cve.mitre.org Open in urlscan Pro
192.52.194.205  Public Scan

Submitted URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39929
Effective URL: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39929
Submission: On July 20 via api from IN — Scanned from DE

Form analysis 1 forms found in the DOM

GET /cgi-bin/cvekey.cgi

<form style="padding:0px; margin:0px;" method="get" action="/cgi-bin/cvekey.cgi">
  <label for="keyword"><span class="redbold" style="text-transform:uppercase">Search CVE Using Keywords:</span></label>&nbsp;&nbsp;<input name="keyword" id="keyword" maxlength="100" tabindex="0" type="textarea">
  <input type="submit" value="Submit">
</form>

Text Content


    
CVE List▾
CVE List Search Search Tips CVE Request Web Form Web Form Help PGP Key Terms of
Use
      
CNAs▾
CVE Numbering Authorities (CNAs) How to Become a CNA
       
WGs▾
CVE Working Groups
       
Board▾
CVE Board Meeting Archives Email Archives
       
About▾
About CVE
     
News▾
News, Blogs & Podcasts



       
Search CVE List
       
Downloads
       
Data Feeds
       
Update a CVE Record
       
Request CVE IDs
       
TOTAL CVE Records: 240830

NOTICE: Transition to the all-new CVE website at WWW.CVE.ORG and CVE Record
Format JSON are underway.

NOTICE: Support for the legacy CVE download formats ended on June 30, 2024.
New CVE List download format is available now on CVE.ORG.



Home > CVE > CVE-2024-39929  

Printer-Friendly View
Full-Screen View

CVE-ID


CVE-2024-39929

Learn more at National Vulnerability Database (NVD)
• CVSS Severity Rating • Fix Information • Vulnerable Software Versions • SCAP
Mappings • CPE Information
Description Exim through 4.97.1 misparses a multiline RFC 2231 header filename,
and thus remote attackers can bypass a $mime_filename extension-blocking
protection mechanism, and potentially deliver executable attachments to the
mailboxes of end users. References Note: References are provided for the
convenience of the reader to help distinguish between vulnerabilities. The list
is not intended to be complete.
 * MISC:https://bugs.exim.org/show_bug.cgi?id=3099#c4
 * MISC:https://git.exim.org/exim.git/commit/1b3209b0577a9327ebb076f3b32b8a159c253f7b
 * MISC:https://git.exim.org/exim.git/commit/6ce5c70cff8989418e05d01fd2a57703007a6357
 * MISC:https://github.com/Exim/exim/compare/exim-4.98-RC2...exim-4.98-RC3
 * MISC:https://www.rfc-editor.org/rfc/rfc2231.txt

Assigning CNA MITRE Corporation Date Record Created 20240704 Disclaimer: The
record creation date may reflect when the CVE ID was allocated or reserved, and
does not necessarily indicate when this vulnerability was discovered, shared
with the affected vendor, publicly disclosed, or updated in CVE. Phase (Legacy)
Assigned (20240704) Votes (Legacy) Comments (Legacy)



Proposed (Legacy) N/A This is an record on the CVE List, which provides common
identifiers for publicly known cybersecurity vulnerabilities.
Search CVE Using Keywords:  
You can also search by reference using the CVE Reference Maps.
For More Information:  CVE Request Web Form (select "Other" from dropdown)

Back to top
Go to CVE.ORG website | Terms of Use | Manage Cookies | Cookie Notice | Privacy
Policy | Contact

Use of the CVE® List and the associated references from this website are subject
to the terms of use. CVE is sponsored by the U.S. Department of Homeland
Security (DHS) Cybersecurity and Infrastructure Security Agency (CISA).
Copyright © 1999–2024, The MITRE Corporation. CVE and the CVE logo are
registered trademarks of The MITRE Corporation.