oss-sec mailing list archives

Re: CVE-2018-6789 Exim 4.90 and earlier: buffer overflow


From: Heiko Schlittermann <hs () schlittermann de>
Date: Thu, 8 Feb 2018 17:57:00 +0100

Heiko Schlittermann <hs () schlittermann de> (Mi 07 Feb 2018 11:39:43 CET):
CVE-2018-6789 Exim 4.90 and earlier
===================================

There is a buffer overflow in an utility function, if some pre-conditions
are met.  Using a handcrafted message, remote code execution seems to be
possible.

Next steps:

* t0:     Distros will get access to our "security" non-public git repo
          (based on the SSH keys known to us)
* t0 +7d: Patch will be published on the official public git repo

t0 will be around 2018-02-08.

t0 is now. Distro maintainers please use the following repo URLs:

The full git repo:

    ssh://git () exim org/exim.git     
    tag: exim-4_90_1

The tarballs git repo:

    ssh://git () exim org/exim-packages.git
    tag: exim-4_90_1

The tags are signed with my key¹, as are the tarballs and my own
commits.

¹) If you get a warning about my key being expired, please refresh it
from the keyservers or from
https://ssl.schlittermann.de/keys/gpg/hs () schlittermann de/F69376CE.asc

    Best regards from Dresden/Germany
    Viele Grüße aus Dresden
    Heiko Schlittermann
-- 
 SCHLITTERMANN.de ---------------------------- internet & unix support -
 Heiko Schlittermann, Dipl.-Ing. (TU) - {fon,fax}: +49.351.802998{1,3} -
 gnupg encrypted messages are welcome --------------- key ID: F69376CE -
 ! key id 7CBF764A and 972EAC9F are revoked since 2015-01 ------------ -

Attachment: signature.asc
Description:


Current thread: