Exim 4.92.3 published with the elimination of the fourth critical vulnerability in a year

Published mail server special release Exim 4.92.3 with the elimination of another critical vulnerability (CVE-2019-16928), potentially allowing you to remotely execute your code on the server by passing a specially formatted string in the EHLO command. The vulnerability appears at the stage after privileges have been reset and is limited to code execution with the rights of an unprivileged user, under which the incoming message handler is executed.

The problem appears only in the Exim 4.92 branch (4.92.0, 4.92.1 and 4.92.2) and does not overlap with the vulnerability fixed at the beginning of the month CVE-2019-15846. The vulnerability is caused by a buffer overflow in a function string_vformat(), defined in the file string.c. Demonstrated exploit allows you to cause a crash by passing a long string (several kilobytes) in the EHLO command, but the vulnerability can be exploited through other commands, and can also potentially be used to organize code execution.

There are no workarounds for blocking the vulnerability, so all users are recommended to urgently install the update, apply patch or make sure to use packages provided by distributions that contain fixes for current vulnerabilities. A hotfix has been released for Ubuntu (affects only branch 19.04), Arch Linux, FreeBSD, Debian (only affects Debian 10 Buster) and Fedora. RHEL and CentOS are not affected by the problem, since Exim is not included in their standard package repository (in EPEL7 update for now no). In SUSE/openSUSE the vulnerability does not appear due to the use of the Exim 4.88 branch.

Source: opennet.ru

Add a comment