All the security reports on this seem to say that it potentially gives
the attacker root access to a system.
Presumably if your exim is not running as root, then the most it can
give is access as your exim user?
John
--
Xronos Scheduler -
https://xronos.uk/
All your school's schedule information in one place.
Timetable, activities, homework, public events - the lot
Live demo at
https://schedulerdemo.xronos.uk/