Docs: Update CVE text about the 4.92.3 release CVE-2019-16928
[exim.git] / doc / doc-txt / cve-2019-16928 / cve.txt
CommitLineData
e101dc5c
JH
1CVE ID: CVE-2019-16928
2Date: 2019-09-27 (CVE assigned)
3Version(s): from 4.92 up to and including 4.92.2
4Reporter: QAX-A-TEAM <areuu@outlook.com>
5Reference: https://bugs.exim.org/show_bug.cgi?id=2449
6Issue: Heap-based buffer overflow in string_vformat,
7 remote code execution seems to be possible
8
9Conditions to be vulnerable
10===========================
11
12All versions from (and including) 4.92 up to (and including) 4.92.2 are
13vulnerable.
14
15Details
16=======
17
18There is a heap-based buffer overflow in string_vformat (string.c).
19The currently known exploit uses a extraordinary long EHLO string to
20crash the Exim process that is receiving the message. While at this
21mode of operation Exim already dropped its privileges, other paths to
22reach the vulnerable code may exist.
23
24Mitigation
25==========
26
27There is - beside updating the server - no known mitigation.
28
29Fix
30===
31
e39f19e0
HSHR
32Download and build the fixed version 4.92.3
33
34 Tarballs: https://ftp.exim.org/pub/exim/exim4/
35 Git: https://github.com/Exim/exim.git
36 - tag exim-4.92.3
37 - branch exim-4.92.3+fixes
38
39The tagged commit is the officially released version. The +fixes branch
40isn't officially maintained, but contains the security fix *and* useful
41fixes.
42
43If you can't install the above versions, ask your package maintainer for
44a version containing the backported fix. On request and depending on our
45resources we will support you in backporting the fix. (Please note,
46the Exim project officially doesn't support versions prior the current
47stable version.)
48
49Timeline
50=========
51
52- 2019-09-27 Report as Bug 2499
53- 2019-09-28 Announcement to exim-maintainers, oss-security
54- 2019-09-28 Release 4.92.3, Release-Announcements to
55 exim-{announce,users,maintainers}, oss-security