Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <20140528145721.GA66770@redoubt.spodhuis.org>
Date: Wed, 28 May 2014 10:57:21 -0400
From: Phil Pennock <oss-security-phil@...dhuis.org>
To: OSS Security <oss-security@...ts.openwall.com>
Subject: Fwd: [exim-announce] Exim 4.82.1 Security Release

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Short version: Exim MTA, CVE-2014-2957, remote code execution based on
email header content when built with the EXPERIMENTAL_DMARC option.
Flaw introduced with that option in Exim 4.82, which was previously the
current release; no prior releases affected.  EXPERIMENTAL_DMARC is not
on by default.  4.82.1 is 4.82 with only this fix.  Exploitation
difficulty should be considered "trivial".

(We're also about to start the RC series for 4.83, which has many many
 more changes; this issue warranted backport).

Heads-up went to packagers who've worked closely with us in the past
and, I believe, belatedly to linux-distros@.  That included the new
release tarballs and the separated out patch, also PGP-signed (by an
Exim Maintainer key in the Strong Set, per our policy, to maximise
chances of verifiability).

Root cause: lack of more experienced Exim developer oversight in
reviewing commits, given the nature of the comment attached to the bad
code:

 http://git.exim.org/exim.git/commitdiff/5b7a7c051c9ab9ee7c924a611f90ef2be03e0ad0

Also: layer violation, a highly convenient language for configuration
and a lack of tainting at the C level to catch this and scream, when
untrusted data is inserted via %s formatting into a string which is then
expanded with the full power of the configuration language.  Morally
equivalent to "shell eval of header content".

Regards,
- -Phil, pdp@...m.org

- ----- Forwarded message from Todd Lyons <tlyons@...m.org> -----

From: Todd Lyons <tlyons@...m.org>
Subject: [exim-announce] Exim 4.82.1 Security Release
To: Exim Dev <exim-dev@...m.org>, Exim Users <exim-users@...m.org>, Exim Announce <exim-announce@...m.org>
Date: Wed, 28 May 2014 13:25:36 +0100
Message-ID: <20140528122535.GA28379@...m.org>

Exim release 4.82.1 is now available from the primary ftp site:
* ftp://ftp.exim.org/pub/exim/exim4/exim-4.82.1.tar.gz
* ftp://ftp.exim.org/pub/exim/exim4/exim-4.82.1.tar.bz2
_________________________________________________________________

This is a SECURITY release, addressing a CRITICAL remote code execution
flaw in Exim version 4.82 (only) when built with DMARC support (an
experimental feature, not on by default).  This release is identical to
4.82 except for the small change needed to plug the security hole.  The
next release of Exim will, eventually, be 4.83, which will include the
many improvements we've made since 4.82, but which will require the
normal release candidate baking process before release.

You are not vulnerable unless you built Exim with EXPERIMENTAL_DMARC.

This issue is known by the CVE ID of CVE-2014-2957, was reported
directly to the Exim development team by a company which uses Exim for
its mail server.  An Exim developer constructed a small patch which
altered the way the contents of the From header is parsed by converting
it to use safer and better internal functions.  It was applied and
tested on a production server for correctness.  We were notified of the
vulnerability Friday night, created a patch on Saturday, applied and
tested it on Sunday, notified OS packagers on Monday/Tuesday, and are
releasing on the next available work day, which is Wednesday.

This is why we have made the smallest feasible changes to prevent
exploit: we want this chagne to be as safe as possible to expedite into
production (if the packages were built with DMARC).

_________________________________________________________________

The primary ftp server is in Cambridge, England. There is a list of
mirrors in:
* http://www.exim.org/mirmon/ftp_mirrors.html

The master ftp server is ftp.exim.org, which is also accessible at
http://ftp.exim.org.

The distribution files are signed with Todd Lyons' PGP key
0xC4F4F94804D29EBA (uid tlyons@...m.org with a strong relationship to
prior release engineer Phil Pennock's PGP key 0x403043153903637F).  This
key should be available from all modern PGP keyservers.  Please use your
own discretion in assessing what trust paths you might have to this uid;
the "Release verification" section of the Release Policy might be of
assistance:

* http://wiki.exim.org/EximReleasePolicy

The detached ASCII signature files are in the same directory as the
tarbundles. The SHA256 hashes for the distribution files are at the end
of this email.

The distribution contains an ASCII copy of the 4.82.1 manual and
other documents. Other formats of the documentation are also
available:-
* ftp://ftp.exim.org/pub/exim/exim4/exim-html-4.82.1.tar.gz
* ftp://ftp.exim.org/pub/exim/exim4/exim-pdf-4.82.1.tar.gz
* ftp://ftp.exim.org/pub/exim/exim4/exim-postscript-4.82.1.tar.gz

The .bz2 versions of these tarbundles are also available.

The only change is this bugfix, thus no ChangeLog-4.82.1 file.
There are no new features, thus no NewStuff-4.82.1 file.

_________________________________________________________________

Release Checksums

SHA256:
51798cead70b9ca03df88afb63f7a0cabedee8ef82c02bd18d67591c08b14500 exim-4.82.1.tar.bz2
f06f34ab599cd84be605b3a00e0fac81f93d9be46d5b9466ac9b38ac5e12dc4c exim-4.82.1.tar.bz2.asc
b8935b31b842cfd77afb345390c07d7b8524a7083fa1963ca7577a66d83d8df0 exim-4.82.1.tar.gz
60487f824f5c8601c21d0ffd70ab56b3d9bc6c62daa801feddee7a49fb8a857d exim-4.82.1.tar.gz.asc
81d0237cff64b259d47c758d5c82da93bd2e7b8ce048974d53d90e597eee122e exim-html-4.82.1.tar.bz2
6f684c90f817a8c41454272310f1a949026a0998c27739493a3c0bdc9346a552 exim-html-4.82.1.tar.bz2.asc
b03f2ca40407b16bd287956baee1fb2b215f8bb79e696d50adedc9148331d289 exim-html-4.82.1.tar.gz
57fb26b6870af5681c789c93437278d8601c14b7cd5255cbd466ab0382ea1387 exim-html-4.82.1.tar.gz.asc
2e3705504f22633a14d417ffcb72c6beddc2f142e38ff4f01394b83ae583ff42 exim-pdf-4.82.1.tar.bz2
2c64767ece949306bfa2432d67d1cc9127b9e318147ee01aba912fc2122493ef exim-pdf-4.82.1.tar.bz2.asc
d209d3db1a80a38e1737ba6cd2e155d2a7c93c0db78aafde86025137001ebcf7 exim-pdf-4.82.1.tar.gz
423fd129818af8f60493b233a1dea5c34890e807ed59e772e0d6e0143148fc5b exim-pdf-4.82.1.tar.gz.asc
f9c69153b1da3ef854c73ac98ec5bcef842438c5630819bc2287dec869bd039d exim-postscript-4.82.1.tar.bz2
c8182006eb59d7a909340f0e7eb4611da3c604ef28a98f5b6ceb676b3c6da9a1 exim-postscript-4.82.1.tar.bz2.asc
1d3c1f1c4bdb66c89b82d3925578f4ab29c87f2af4e3e1c1096366bafdfad000 exim-postscript-4.82.1.tar.gz
067a55860b3da017c6d9f23e8df944e9aca2d73f1de65f44b1557f4878f64cb1 exim-postscript-4.82.1.tar.gz.asc


- -- Todd Lyons, pp The Exim Maintainers.

- ----- End forwarded message -----
-----BEGIN PGP SIGNATURE-----

iQEcBAEBCAAGBQJThflIAAoJEKBsj+IM0duFafkH/1ulHdWdJFW1C7Q7esFRLpM1
AADXUWBx0VQ4itwXaIhXpOWSw2SeX8C9qUP96YusKS2BRZWLk41wb3prWP5ehqUE
5xbTKci7HPPO1d+NfmYkWp55WDuKEgTH7d2tCHC8EnHvm+N/drZNOdZfLPz0UBaM
0KmbOFkueLcEr0JzVqHEoIBtjtWONGVzg63Sfmkw3m0KetT8iX6rBN2ekHvUHnti
eKsQ/Y0E8o56OYJ2s/AxDLPs6JMgyIxQV5SjcHZBcb+4PxV0f3dZs5EnCz2ROW1v
MKN3eu6N+um+tss8vTafHltcUn/5LFyoXYLoj33k7Bz1pVcqWH4AhNcITpswEvo=
=4ybl
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.