[ASA-201802-6] exim: arbitrary code execution

Jelle van der Waa jelle at archlinux.org
Tue Feb 13 20:38:03 UTC 2018


Arch Linux Security Advisory ASA-201802-6
=========================================

Severity: High
Date    : 2018-02-12
CVE-ID  : CVE-2018-6789
Package : exim
Type    : arbitrary code execution
Remote  : Yes
Link    : https://security.archlinux.org/AVG-608

Summary
=======

The package exim before version 4.90.1-1 is vulnerable to arbitrary
code execution.

Resolution
==========

Upgrade to 4.90.1-1.

# pacman -Syu "exim>=4.90.1-1"

The problem has been fixed upstream in version 4.90.1.

Workaround
==========

None.

Description
===========

An issue was discovered in the base64d function in the SMTP listener in
Exim before 4.90.1. By sending a handcrafted message, a buffer overflow
may happen. This can be used to execute code remotely.

Impact
======

A remote attacker is able to execute arbitrary code on the affected
host by sending a crafted message.

References
==========

http://exim.org/static/doc/security/CVE-2018-6789.txt
https://marc.info/?l=oss-security&m=151828631632609
https://security.archlinux.org/CVE-2018-6789
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 488 bytes
Desc: not available
URL: <https://lists.archlinux.org/pipermail/arch-security/attachments/20180213/d5297df4/attachment.asc>


More information about the arch-security mailing list