diff --git a/modules/exploits/unix/smtp/exim4_string_format.rb b/modules/exploits/unix/smtp/exim4_string_format.rb index 13cbe5d432..742a856397 100644 --- a/modules/exploits/unix/smtp/exim4_string_format.rb +++ b/modules/exploits/unix/smtp/exim4_string_format.rb @@ -46,8 +46,9 @@ class Metasploit3 < Msf::Exploit::Remote An additional vulnerability, CVE-2010-4345, was also used in the attack that led to the discovery of danger of this bug. This bug allows a local user to - gain root privileges from the Exim user account. We are not currently - utilizing that bug within this module. + gain root privileges from the Exim user account. If the Perl interpreter is + found on the remote system, this module will automatically exploit the + secondary bug as well to get root. }, 'Author' => [ 'jduck' ], 'License' => MSF_LICENSE, @@ -55,6 +56,7 @@ class Metasploit3 < Msf::Exploit::Remote 'References' => [ [ 'CVE', '2010-4344' ], + [ 'CVE', '2010-4345' ], [ 'OSVDB', '69685' ], # [ 'BID', '' ], # [ 'URL', '' ],