tidying
[exim.git] / doc / doc-txt / cve-2019-13917
CommitLineData
21aa0597
JH
1CVE ID: CVE-2019-13917
2OVE ID: OVE-20190718-0006
3Date: 2019-07-18
4Credits: Jeremy Harris
5Version(s): 4.85 up to and including 4.92
6Issue: A local or remote attacker can execute programs with root
7 privileges - if you've an unusual configuration. See below.
8
9Conditions to be vulnerable
10===========================
11
12If your configuration uses the ${sort } expansion for items that can be
13controlled by an attacker (e.g. $local_part, $domain). The default
14config, as shipped by the Exim developers, does not contain ${sort }.
15
16Details
17=======
18
19The vulnerability is exploitable either remotely or locally and could
20be used to execute other programs with root privilege. The ${sort }
21expansion re-evaluates its items.
22
23Mitigation
24==========
25
26Do not use ${sort } in your configuration.
27
28Fix
29===
30
31Download and build a fixed version:
32
33 Tarballs: http://ftp.exim.org/pub/exim/exim4/
34 Git: https://github.com/Exim/exim.git
35 - tag exim-4.92.1
36 - branch exim-4.92+fixes
37
38The tagged commit is the officially released version. The +fixes branch
39isn't officially maintained, but contains useful patches *and* the
40security fix.
41
42If you can't install the above versions, ask your package maintainer for
43a version containing the backported fix. On request and depending on our
44resources we will support you in backporting the fix. (Please note,
45that Exim project officially doesn't support versions prior the current
46stable version.)