GLSA Advocate
Joined: 12 May 2004 Posts: 2663
|
Posted: Sun Sep 24, 2017 8:26 pm Post subject: [ GLSA 201709-19 ] Exim |
|
|
Gentoo Linux Security Advisory
Title: Exim: Local privilege escalation (GLSA 201709-19)
Severity: normal
Exploitable: local
Date: 2017-09-24
Bug(s): #622212
ID: 201709-19
Synopsis
A vulnerability in Exim may allow local users to gain root
privileges.
Background
Exim is a message transfer agent (MTA) developed at the University of
Cambridge for use on Unix systems connected to the Internet.
Affected Packages
Package: mail-mta/exim
Vulnerable: < 4.89-r1
Unaffected: >= 4.89-r1
Architectures: All supported architectures
Description
Exim supports the use of multiple “-p” command line arguments
causing a memory leak. This could lead to a stack-clash in user-space and
as result the attacker can, “clash” or “smash” the stack or
another memory region, or “jump” over the stack guard-page.
Impact
A local attacker could obtain root privileges.
Workaround
There is no known workaround at this time.
Resolution
All Exim users should upgrade to the latest version: Code: | # emerge --sync
# emerge --ask --oneshot --verbose ">=mail-mta/exim-4.89-r1"
|
References
CVE-2017-1000369
|
|