Anfälligkeitssuche        Suche in 219043 CVE Beschreibungen
und 99761 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.881390
Kategorie:CentOS Local Security Checks
Titel:CentOS Update for exim CESA-2011:0153 centos5 x86_64
Zusammenfassung:The remote host is missing an update for the 'exim'; package(s) announced via the referenced advisory.
Beschreibung:Summary:
The remote host is missing an update for the 'exim'
package(s) announced via the referenced advisory.

Vulnerability Insight:
Exim is a mail transport agent (MTA) developed at the University of
Cambridge for use on UNIX systems connected to the Internet.

A privilege escalation flaw was discovered in Exim. If an attacker were
able to gain access to the 'exim' user, they could cause Exim to execute
arbitrary commands as the root user. (CVE-2010-4345)

This update adds a new configuration file, '/etc/exim/trusted-configs'. To
prevent Exim from running arbitrary commands as root, Exim will now drop
privileges when run with a configuration file not listed as trusted. This
could break backwards compatibility with some Exim configurations, as the
trusted-configs file only trusts '/etc/exim/exim.conf' and
'/etc/exim/exim4.conf' by default. If you are using a configuration file
not listed in the new trusted-configs file, you will need to add it
manually.

Additionally, Exim will no longer allow a user to execute exim as root with
the -D command line option to override macro definitions. All macro
definitions that require root permissions must now reside in a trusted
configuration file.

Users of Exim are advised to upgrade to these updated packages, which
contain a backported patch to correct this issue. After installing this
update, the exim daemon will be restarted automatically.

Affected Software/OS:
exim on CentOS 5

Solution:
Please install the updated packages.

CVSS Score:
6.9

CVSS Vector:
AV:L/AC:M/Au:N/C:C/I:C/A:C

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2010-4345
BugTraq ID: 45341
http://www.securityfocus.com/bid/45341
Bugtraq: 20101213 Exim security issue in historical release (Google Search)
http://www.securityfocus.com/archive/1/515172/100/0/threaded
CERT/CC vulnerability note: VU#758489
http://www.kb.cert.org/vuls/id/758489
Debian Security Information: DSA-2131 (Google Search)
http://www.debian.org/security/2010/dsa-2131
Debian Security Information: DSA-2154 (Google Search)
http://www.debian.org/security/2011/dsa-2154
http://www.metasploit.com/modules/exploit/unix/smtp/exim4_string_format
http://www.theregister.co.uk/2010/12/11/exim_code_execution_peril/
http://www.exim.org/lurker/message/20101207.215955.bb32d4f2.en.html
http://lists.exim.org/lurker/message/20101209.172233.abcba158.en.html
http://lists.exim.org/lurker/message/20101210.164935.385e04d0.en.html
http://openwall.com/lists/oss-security/2010/12/10/1
http://www.openwall.com/lists/oss-security/2021/05/04/7
http://www.redhat.com/support/errata/RHSA-2011-0153.html
http://www.securitytracker.com/id?1024859
http://secunia.com/advisories/42576
http://secunia.com/advisories/42930
http://secunia.com/advisories/43128
http://secunia.com/advisories/43243
SuSE Security Announcement: SUSE-SA:2010:059 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00003.html
http://www.ubuntu.com/usn/USN-1060-1
http://www.vupen.com/english/advisories/2010/3171
http://www.vupen.com/english/advisories/2010/3204
http://www.vupen.com/english/advisories/2011/0135
http://www.vupen.com/english/advisories/2011/0245
http://www.vupen.com/english/advisories/2011/0364
CopyrightCopyright (c) 2012 Greenbone Networks GmbH

Dies ist nur einer von 99761 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2024 E-Soft Inc. Alle Rechte vorbehalten.