Executive Summary

Summary
TitleExim: Multiple vulnerabilities
Informations
NameGLSA-201909-06First vendor Publication2019-09-07
VendorGentooLast vendor Modification2019-09-07
Severity (Vendor) N/ARevisionN/A

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:C/I:C/A:C)
Cvss Base Score10Attack RangeNetwork
Cvss Impact Score10Attack ComplexityLow
Cvss Expoit Score10AuthenticationNone Required
Calculate full CVSS 2.0 Vectors scores

Detail

Synopsis

Multiple vulnerabilities have been found in Exim, the worst of which allows remote attackers to execute arbitrary code.

Background

Exim is a message transfer agent (MTA) designed to be a a highly configurable, drop-in replacement for sendmail.

Description

Multiple vulnerabilities have been discovered in Exim. Please review the CVE identifiers referenced below for details.

Impact

A remote attacker, by connecting to the SMTP listener daemon, could possibly execute arbitrary code with the privileges of the process or cause a Denial of Service condition.

Workaround

There is no known workaround at this time.

Resolution

All Exim users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=mail-mta/exim-4.92.2"

References

[ 1 ] CVE-2019-13917 : https://nvd.nist.gov/vuln/detail/CVE-2019-13917
[ 2 ] CVE-2019-15846 : https://nvd.nist.gov/vuln/detail/CVE-2019-15846

Availability

This GLSA and any updates to it are available for viewing at the Gentoo Security Website:

https://security.gentoo.org/glsa/201909-06

Original Source

Url : http://security.gentoo.org/glsa/glsa-201909-06.xml

CWE : Common Weakness Enumeration

%idName
50 %CWE-119Failure to Constrain Operations within the Bounds of a Memory Buffer
50 %CWE-19Data Handling

CPE : Common Platform Enumeration

TypeDescriptionCount
Application135
Os4

Alert History

If you want to see full details history, please login or register.
0
DateInformations
2019-09-07 05:18:55
  • First insertion