Rapid7 Vulnerability & Exploit Database

CESA-2005:358: exim security update

Back to Search

CESA-2005:358: exim security update

Severity
8
CVSS
(AV:N/AC:L/Au:N/C:P/I:P/A:P)
Published
08/23/2005
Created
07/25/2018
Added
03/12/2010
Modified
07/04/2017

Description

Updated exim packages that fix a security issue in PCRE and a free space computation on large file system bug are now available for CentOS Enterprise Linux 4. This update has been rated as having moderate security impact by the Red Hat Security Response Team.

Exim is a mail transport agent (MTA) developed at the University of Cambridge for use on Unix systems connected to the Internet. An integer overflow flaw was found in PCRE, a Perl-compatible regular expression library included within Exim. A local user could create a maliciously crafted regular expression in such as way that they could gain the privileges of the 'exim' user. The Common Vulnerabilities and Exposures project assigned the name CAN-2005-2491 to this issue. These erratum packages change Exim to use the system PCRE library instead of the internal one. These packages also fix a minor flaw where the Exim Monitor was incorrectly computing free space on very large file systems. Users should upgrade to these erratum packages and also ensure they have updated the system PCRE library, for which erratum packages are available seperately in RHSA-2005:761

Solution(s)

  • centos-upgrade-exim
  • centos-upgrade-exim-doc
  • centos-upgrade-exim-mon
  • centos-upgrade-exim-sa

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;