Exim contains a flaw in the expansion of arguments to math comparison functions, which can result in the values being doubled.
The end result is that an attacker can perform a local command execution if they are able to perform a look-up using Exim against files that they can edit. In some cases, such as Exim being bundled with cPanel, the local command execution can actually lead to a root compromise as the Exim look-up is being done by the root user.
We have deemed this vulnerability to be rated as HIGH due to the fact that a user can perform local commands under certain circumstances.
This vulnerability was tested against Exim 4.82 and is believed to exist in all previous versions.
This vulnerability was patched in Exim 4.83.