
pdp at exim
May 12, 2011, 3:29 AM
Post #1 of 1
(1194 views)
Permalink
|
|
Exim 4.76 Release: updated impact assessment
|
|
-----BEGIN PGP SIGNED MESSAGE----- Hash: RIPEMD160 On 2011-05-09 at 05:16 -0400, Phil Pennock wrote: > This is a SECURITY release: Exim versions 4.70 up to and including 4.75 > contained a security hole (format string attack) permitting remote > execution of arbitrary code as the Exim run-time user. This is > CVE-2011-1764. There is also another, lesser security issue. Both lie > in the DKIM code and mitigation techniques are described below. Further analysis revealed that the second security was more severe than I realised at the time that I wrote the announcement. The second security issue has been assigned CVE-2011-1407 and is also a remote code execution flaw. For clarity: both issues were introduced with 4.70. If you have already updated to Exim 4.76, then no further action is required. If you are running 4.76 RC1, or have cherry-picked patches back to your release, then please either update or start hunting some fresh cherries. > Note that as part of our work to improve Exim and protect against future > security issues, some changes were made to the code to pass gcc with > many more warnings enabled, and in some cases to compile with Clang. > Although feedback so far has been positive, there remains a chance that > these changes will cause compilation problems on lesser-tested > platforms; please raise any issues encountered on the exim-users > mailing-list. Users of HP-UX will wish to apply the patch available at: http://git.exim.org/exim.git/commit/f1a29782e1db8bae2bdadf1335c3687cb8b820f6 Regards, - -Phil -----BEGIN PGP SIGNATURE----- iEYEAREDAAYFAk3LtmIACgkQQDBDFTkDY3+skACeLFLx18wjA7i6xvOU0/TrY1I9 ClkAnjAOMh7wecyPzbmX3VXrB7ovfVxC =/atc -----END PGP SIGNATURE----- -- ## List details at https://lists.exim.org/mailman/listinfo/exim-announce Exim details at http://www.exim.org/ ##
|