Joined: 12 May 2004
|Posted: Wed Jul 20, 2016 1:26 pm Post subject: [ GLSA 201607-12 ] Exim
|Gentoo Linux Security Advisory
Title: Exim: Arbitrary code execution (GLSA 201607-12)
Date: July 20, 2016
Bug(s): #517934, #576582
A local attacker could execute arbitrary code by providing
unsanitized data to a data source or escalate privileges.
Exim is a message transfer agent (MTA) designed to be a a highly
configurable, drop-in replacement for sendmail.
Vulnerable: < 4.87
Unaffected: >= 4.87
Architectures: All supported architectures
Vulnerabilities have been discovered in Exim’s implementation of
set-uid root and when using ‘perl_startup’. These vulnerabilities
require a user account on the Exim server and a configuration that does
lookups against files to which the user has edit access.
A local attacker could possibly execute arbitrary code with the
privileges of the process, or escalate privileges.
There is no known workaround at this time.
All Exim users should upgrade to the latest version:
|# emerge --sync
# emerge --ask --oneshot --verbose ">=mail-mta/exim-4.87"