Startseite ▼ Bookkeeping
Online ▼ Sicherheits
Überprüfungs ▼
Verwaltetes
DNS ▼
Info
Bestellen/Erneuern
FAQ
AUP
Dynamic DNS Clients
Domaine konfigurieren Dyanmic DNS Update Password Netzwerk
Überwachung ▼
Enterprise
Erweiterte
Standard
Gratis Test
FAQ
Preis/Funktionszusammenfassung
Bestellen
Beispiele
Konfigurieren/Status Alarm Profile | |||
Test Kennung: | 1.3.6.1.4.1.25623.1.0.880502 |
Kategorie: | CentOS Local Security Checks |
Titel: | CentOS Update for exim CESA-2011:0153 centos5 i386 |
Zusammenfassung: | The remote host is missing an update for the 'exim'; package(s) announced via the referenced advisory. |
Beschreibung: | Summary: The remote host is missing an update for the 'exim' package(s) announced via the referenced advisory. Vulnerability Insight: Exim is a mail transport agent (MTA) developed at the University of Cambridge for use on UNIX systems connected to the Internet. A privilege escalation flaw was discovered in Exim. If an attacker were able to gain access to the 'exim' user, they could cause Exim to execute arbitrary commands as the root user. (CVE-2010-4345) This update adds a new configuration file, '/etc/exim/trusted-configs'. To prevent Exim from running arbitrary commands as root, Exim will now drop privileges when run with a configuration file not listed as trusted. This could break backwards compatibility with some Exim configurations, as the trusted-configs file only trusts '/etc/exim/exim.conf' and '/etc/exim/exim4.conf' by default. If you are using a configuration file not listed in the new trusted-configs file, you will need to add it manually. Additionally, Exim will no longer allow a user to execute exim as root with the -D command line option to override macro definitions. All macro definitions that require root permissions must now reside in a trusted configuration file. Users of Exim are advised to upgrade to these updated packages, which contain a backported patch to correct this issue. After installing this update, the exim daemon will be restarted automatically. Affected Software/OS: exim on CentOS 5 Solution: Please install the updated packages. CVSS Score: 6.9 CVSS Vector: AV:L/AC:M/Au:N/C:C/I:C/A:C |
Querverweis: |
Common Vulnerability Exposure (CVE) ID: CVE-2010-4345 BugTraq ID: 45341 http://www.securityfocus.com/bid/45341 Bugtraq: 20101213 Exim security issue in historical release (Google Search) http://www.securityfocus.com/archive/1/515172/100/0/threaded CERT/CC vulnerability note: VU#758489 http://www.kb.cert.org/vuls/id/758489 Debian Security Information: DSA-2131 (Google Search) http://www.debian.org/security/2010/dsa-2131 Debian Security Information: DSA-2154 (Google Search) http://www.debian.org/security/2011/dsa-2154 http://www.metasploit.com/modules/exploit/unix/smtp/exim4_string_format http://www.theregister.co.uk/2010/12/11/exim_code_execution_peril/ http://www.exim.org/lurker/message/20101207.215955.bb32d4f2.en.html http://lists.exim.org/lurker/message/20101209.172233.abcba158.en.html http://lists.exim.org/lurker/message/20101210.164935.385e04d0.en.html http://openwall.com/lists/oss-security/2010/12/10/1 http://www.openwall.com/lists/oss-security/2021/05/04/7 http://www.redhat.com/support/errata/RHSA-2011-0153.html http://www.securitytracker.com/id?1024859 http://secunia.com/advisories/42576 http://secunia.com/advisories/42930 http://secunia.com/advisories/43128 http://secunia.com/advisories/43243 SuSE Security Announcement: SUSE-SA:2010:059 (Google Search) http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00003.html http://www.ubuntu.com/usn/USN-1060-1 http://www.vupen.com/english/advisories/2010/3171 http://www.vupen.com/english/advisories/2010/3204 http://www.vupen.com/english/advisories/2011/0135 http://www.vupen.com/english/advisories/2011/0245 http://www.vupen.com/english/advisories/2011/0364 |
Copyright | Copyright (c) 2011 Greenbone Networks GmbH |
Dies ist nur einer von 99761 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus. Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten. |