GLSA Advocate
Joined: 12 May 2004 Posts: 2663
|
Posted: Wed Jul 20, 2016 1:26 pm Post subject: [ GLSA 201607-12 ] Exim |
|
|
Gentoo Linux Security Advisory
Title: Exim: Arbitrary code execution (GLSA 201607-12)
Severity: normal
Exploitable: local
Date: July 20, 2016
Bug(s): #517934, #576582
ID: 201607-12
Synopsis
A local attacker could execute arbitrary code by providing
unsanitized data to a data source or escalate privileges.
Background
Exim is a message transfer agent (MTA) designed to be a a highly
configurable, drop-in replacement for sendmail.
Affected Packages
Package: mail-mta/exim
Vulnerable: < 4.87
Unaffected: >= 4.87
Architectures: All supported architectures
Description
Vulnerabilities have been discovered in Exim’s implementation of
set-uid root and when using ‘perl_startup’. These vulnerabilities
require a user account on the Exim server and a configuration that does
lookups against files to which the user has edit access.
Impact
A local attacker could possibly execute arbitrary code with the
privileges of the process, or escalate privileges.
Workaround
There is no known workaround at this time.
Resolution
All Exim users should upgrade to the latest version: Code: | # emerge --sync
# emerge --ask --oneshot --verbose ">=mail-mta/exim-4.87"
|
References
CVE-2014-2972 |
|