SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (E-mail Server)  >   Exim Vendors:   Exim.org
Exim Perl Environment Processing Flaw Lets Local Users Obtain Root Privileges
SecurityTracker Alert ID:  1035512
SecurityTracker URL:  http://securitytracker.com/id/1035512
CVE Reference:   CVE-2016-1531   (Links to External Site)
Date:  Apr 8 2016
Impact:   Root access via local system
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): prior to 4.86.2
Description:   A vulnerability was reported in Exim. A local user can obtain root privileges on the target system.

A local user can modify the perl environment and then start Exim to execute arbitrary commands on the target system with root privileges.

Systems with Exim configured with set user id (setuid) root user privileges and using 'perl_startup' are affected.

A demonstration exploit is available at:

https://packetstormsecurity.com/files/136124/Exim-4.84-3-Local-Root-Privilege-Escalation.html

Hacker Fantastic reported this vulnerability.

Impact:   A local user can obtain root privileges on the target system.
Solution:   The vendor has issued a fix (4.86.2).

The vendor's advisory is available at:

http://www.exim.org/static/doc/CVE-2016-1531.txt

Vendor URL:  www.exim.org/static/doc/CVE-2016-1531.txt (Links to External Site)
Cause:   Access control error
Underlying OS:  Linux (Any), UNIX (Any)

Message History:   None.


 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC