Date: Fri, 26 Jul 2019 08:52:49 +0000 (UTC) From: Vsevolod Stakhov <vsevolod@FreeBSD.org> To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r507345 - head/security/vuxml Message-ID: <201907260852.x6Q8qnBZ034181@repo.freebsd.org>
next in thread | raw e-mail | index | archive | help
Author: vsevolod Date: Fri Jul 26 08:52:48 2019 New Revision: 507345 URL: https://svnweb.freebsd.org/changeset/ports/507345 Log: Document exim vulnerability CVE-2019-13917 Modified: head/security/vuxml/vuln.xml Modified: head/security/vuxml/vuln.xml ============================================================================== --- head/security/vuxml/vuln.xml Fri Jul 26 08:51:40 2019 (r507344) +++ head/security/vuxml/vuln.xml Fri Jul 26 08:52:48 2019 (r507345) @@ -58,6 +58,45 @@ Notes: * Do not forget port variants (linux-f10-libxml2, libxml2, etc.) --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="3e0da406-aece-11e9-8d41-97657151f8c2"> + <topic>Exim -- RCE in ${sort} expansion</topic> + <affects> + <package> + <name>exim</name> + <range><ge>4.85</ge><le>4.92</le></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Exim team report:</p> + <blockquote cite="https://www.exim.org/static/doc/security/CVE-2019-13917.txt"> + <p> + A local or remote attacker can execute programs with root privileges - if you've an unusual configuration. + </p> + <p> + If your configuration uses the ${sort } expansion for items that can be controlled by an attacker (e.g. $local_part, $domain). The default config, as shipped by the Exim developers, does not contain ${sort }. + </p> + <p> + The vulnerability is exploitable either remotely or locally and could +be used to execute other programs with root privilege. The ${sort } +expansion re-evaluates its items. + </p> + <p> + Exim 4.92.1 is not vulnerable. + </p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2019-13917</cvename> + <url>https://www.exim.org/static/doc/security/CVE-2019-13917.txt</url> + </references> + <dates> + <discovery>2019-07-18</discovery> + <entry>2019-07-25</entry> + </dates> + </vuln> + <vuln vid="198e6220-ac8b-11e9-a1c7-b499baebfeaf"> <topic>MySQL -- Multiple vulerabilities</topic> <affects>
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201907260852.x6Q8qnBZ034181>