exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Exim Exploit In The Wild Advisory

Exim Exploit In The Wild Advisory
Posted Dec 13, 2010
Authored by Nigel Metheringham

It has come to the attention of The Exim Maintainers that there is an exploit circulating in the wild which affects versions of Exim versions 4.69 and below. The flaw permits remote code execution over SMTP and, when combined with some clever abuse of Exim's configuration, escalation to root privileges from the Exim run-time user.

tags | advisory, remote, overflow, root, code execution
advisories | CVE-2010-4344, CVE-2010-4345, CVE-2010-2023, CVE-2010-2024
SHA-256 | 5adb4da500bcb608c4a6e8d0326b0cf1582c4c29fc9fdc75ec210086b2a2eb60

Exim Exploit In The Wild Advisory

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

It has come to the attention of The Exim Maintainers that there is
an exploit circulating in the wild which affects versions of Exim
versions 4.69 and below -- Exim 4.70 was released in November 2009.
The flaw permits remote code execution over SMTP and, when combined
with some clever abuse of Exim's configuration, escalation to root
privileges from the Exim run-time user. [1]

The 4.72 release from June 2010 was also a security-fix release,
for some lesser problems [4]. We suggest that this is the release
that is safest for deployment.

We encourage all Exim users to remain up-to-date with Exim
releases. The exim-announce list [2] is a low-volume moderated list
which announces new releases.

We regret that the full impact of the problem fixed in 4.70 was not
appreciated and that we did not draw more attention to it than the
ChangeLog notice "Potential buffer overflow in string_format". With
more pro-active notification on our part, vendors who package old
releases and backport minimal fixes may have included this fix too.

We expect that the 4.73 release of Exim will include changes that
protect against the privilege escalation seen in the exploit. Some
of the changes in behaviour may cause issues in certain
configurations and there may be configuration changes required as a
result; we take pride in retaining full backwards compatibility of
configurations within a major number, but we are prepared to make
an exception in this case.

As always, full details of changes will be listed in "NewStuff" and
"ChangeLog" and we shall, for the 4.73 release, explicitly detail
what changes in behaviour may cause issues.

We'd like to thank Eugene Bujak for noticing and patching the
problem originally and Sergey Kononenko for reporting the active
exploit. Thanks are due to Intel, UC Berkeley, Red Hat and Astaro
AG for their work to identify the problem exploited and their work
on fixes for 4.73.

This is an update to the earlier notification [3] sent to the
exim-dev list.

Regards,
Nigel Metheringham
pp The Exim Maintainers

[1] CVE-2010-4344 exim remote code execution flaw
CVE-2010-4345 exim privilege escalation
[2] http://www.exim.org/mailman/listinfo/exim-announce
[3] http://www.exim.org/lurker/message/20101210.164935.385e04d0.en.html
[4] CVE-2010-2023 Exim world-writable mail directory with sticky-bit
CVE-2010-2024 Exim MBX locking race condition

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (Darwin)

iEYEARECAAYFAk0GJ9kACgkQhauDP93AMmKUugCghxOajkIfoy2Umj+8fNWRijFL
l+4AnjiqB9vIQATPUgRpxjZe1YlLMkOm
=3Nky
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close