|
Message-ID: <1012100939540.799@mjc.redhat.com> Date: Fri, 10 Dec 2010 09:48:20 +0000 (GMT) From: Mark J Cox <mjc@...hat.com> To: oss-security@...ts.openwall.com cc: "Steven M. Christey" <coley@...us.mitre.org> Subject: Exim remote root A number of sites are reporting an exim remote root based from this report: http://www.exim.org/lurker/message/20101207.215955.bb32d4f2.en.html Quoting David Woodhouse: "There are two bugs here. First a remote exploit where the attacker somehow tricks Exim into evaluating data it shouldn't, and honouring a ${run {/bin/sh...}} directive which ends up giving the attacker a shell (as user 'exim'). Secondly a privilege escalation where the trusted 'exim' user is able to tell Exim to use arbitrary config files, in which further ${run ...} commands will be invoked as root." https://bugzilla.redhat.com/show_bug.cgi?id=661756#c3 The remote vulnerability is still being investigated. However it is worth allocating the CVE names now to help with co-ordination. CVE-2010-4344 exim vuln that allows remote code execution as 'exim' CVE-2010-4345 exim vuln that allows privilege escalation 'exim' to root A patch for CVE-2010-4345: http://lists.exim.org/lurker/message/20101209.172233.abcba158.en.html Thanks, Mark -- Mark J Cox / Red Hat Security Response
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.