what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Debian Security Advisory 4517-1

Debian Security Advisory 4517-1
Posted Sep 6, 2019
Authored by Debian | Site debian.org

Debian Linux Security Advisory 4517-1 - "Zerons" and Qualys discovered that a buffer overflow triggerable in the TLS negotiation code of the Exim mail transport agent could result in the execution of arbitrary code with root privileges.

tags | advisory, overflow, arbitrary, root
systems | linux, debian
advisories | CVE-2019-15846
SHA-256 | 48c9e7e3415df4075f9fcb477fc3b8cd54fa5aa909f175f1c2839f3653a83d56

Debian Security Advisory 4517-1

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4517-1 security@debian.org
https://www.debian.org/security/ Moritz Muehlenhoff
September 06, 2019 https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : exim4
CVE ID : CVE-2019-15846

"Zerons" and Qualys discovered that a buffer overflow triggerable in the
TLS negotiation code of the Exim mail transport agent could result in the
execution of arbitrary code with root privileges.

For the oldstable distribution (stretch), this problem has been fixed
in version 4.89-2+deb9u6.

For the stable distribution (buster), this problem has been fixed in
version 4.92-8+deb10u2.

We recommend that you upgrade your exim4 packages.

For the detailed security status of exim4 please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/exim4

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----

iQIzBAEBCgAdFiEEtuYvPRKsOElcDakFEMKTtsN8TjYFAl1yMboACgkQEMKTtsN8
TjZOLRAAv9Cz0QJM0Rs7hlzduoMpqMZS4pkhj+hrXf7WyRiIr7RZdJkxKVd3wVRr
frEN0UEKGzqn0+7Fc4Db6Q7vttRMP9RowsKkxmcsdrgXAdZZGVBF00JxjMGVV/Mr
ovNI43MO7bbi87DlxCIbE/vt36+UvQG/xCuM2+b5gnsjshp9MnjViESFpM2PU9Uo
99jCeko/l5FQt/Wyy/ewai2YhTWO78Joe3c9RtjhO2U+m0sg0knjyC6IPUO8irp7
ODvjysE55OdWtRNraDCQH0PWErKIpy/qHnocF1WTXV8YPX4yvNivUyCPnPRvyp0I
ffiUMxE/JqBg9x9V3fUM8fHbkuds4LM1NroysEf+11VHlOj33PY8dFUpKG8fq20y
Alww3vO2GLBaj+wLLemDVEnesrSn0oifm7PGTvRCz5q5A+uHvjoHQ5rKjap5hMrF
iYcbjd5ryIlEFy3ZTSG/GyVTvZPnxhR2a/71JP9RhLKFvhxT5PArYMMUL2YiTcrp
xvRAnD4bsrVqRIrDFd8zpxDgCLSrLm0wLARI3hePZvY/Y5ARjV7K4siaWR7WJgXE
agznj8o0by5aYpQTCUpWmpEDlu3uSlrqtxk3Y4S/9hgfWakY3p3tbfTyOdw8wiSi
zn2hewy3CEA7G8fNvyNPTz16UWUbsnbOMFK5OaEApEIabremrIE=JUdN
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close