Exim 4.80.1 Critical Security Release
As an FYI, the Exim developers released Exim 4.80.1 today which is a critical security release addressing a remote code execution flaw in Exim versions between 4.70 and 4.80 inclusive. The release announcement is here: https://lists.exim.org/lurker/message/20121026.080330.74b9147b.en.html Basically, this vulnerability can be triggered by anyone who can send you email from a domain for which they control the DNS, and thereby provides them access to the Exim run-time user. Quoting another post by Exim developer, Phil Pennock: "Thanks to a certain Wired article, I decided this area of the codebase (of many MTAs) would be likely to be reviewed by more than just me, so it would be sheer hubris to hope that this remained undiscovered by blackhats." If your Exim version was compiled using the default options then your installation is vulnerable. Hence, the Exim versions provided in by most Linux and Unix distributions are most certainly vulnerable until updated. So, make sure that you update your Exim version immediately when the next Exim update becomes available for your distribution. As per the above link, you can protect your installation from this vulnerability if you put this at the start of your ACLs plumbed into acl_smtp_connect or acl_smtp_rcpt: warn control = dkim_disable_verify Thus, to protect your Exim4U installation until your Exim version is updated, modify your /etc/exim/exim.conf file as follows: After the line: acl_connect: add: warn control = dkim_disable_verify And, after the line: acl_check_rcpt: add: warn control = dkim_disable_verify You can remove these modifications after your Exim version is updated to protect against this vulnerability. FYI, Gordon
participants (1)
-
Gordon Dickens