SB2015092638 - Debian update for exim4



SB2015092638 - Debian update for exim4

Published: September 26, 2015

Security Bulletin ID SB2015092638
Severity
High
Patch available
YES
Number of vulnerabilities 2
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 50% Low 50%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 2 secuirty vulnerabilities.


1) Heap-based buffer overflow (CVE-ID: CVE-2010-4344)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists in the string_vformat function in string.c due to heap-based buffer overflow. A remote attacker can trigger memory corruption and execute arbitrary code via an SMTP session that includes two MAIL commands in conjunction with a large message containing specially crafted headers, leading to improper rejection logging.

2) Privilege escalation (CVE-ID: CVE-2010-4345)

The vulnerability allows a local user to escalate privileges on vulnerable system.

The vulnerability exists due to design error in Exim, when allowing local users to load arbitrary configuration file via the "spool_directory" directive. A local user can specify an alternate configuration file with a directive that contains arbitrary commands and execute arbitrary commands on the system with root privileges.

Successful exploitation of this vulnerability will allow a local user to gain root privileges on the system.


Remediation

Install update from vendor's website.