2024-06-28 13:17:52 +00:00

217 lines
9.4 KiB
JSON
Raw Blame History

This file contains invisible Unicode characters

This file contains invisible Unicode characters that are indistinguishable to humans but may be processed differently by a computer. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20181409",
"Version": "oval:org.altlinux.errata:def:20181409",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2018-1409: package `exim` update to version 4.90.1-alt1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch c9f2"
],
"Products": [
"ALT SPWorkstation",
"ALT SPServer"
]
}
],
"References": [
{
"RefID": "ALT-PU-2018-1409",
"RefURL": "https://errata.altlinux.org/ALT-PU-2018-1409",
"Source": "ALTPU"
},
{
"RefID": "BDU:2018-00088",
"RefURL": "https://bdu.fstec.ru/vul/2018-00088",
"Source": "BDU"
},
{
"RefID": "BDU:2018-00395",
"RefURL": "https://bdu.fstec.ru/vul/2018-00395",
"Source": "BDU"
},
{
"RefID": "CVE-2016-1531",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-1531",
"Source": "CVE"
},
{
"RefID": "CVE-2016-9963",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-9963",
"Source": "CVE"
},
{
"RefID": "CVE-2017-1000369",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-1000369",
"Source": "CVE"
},
{
"RefID": "CVE-2017-16943",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-16943",
"Source": "CVE"
},
{
"RefID": "CVE-2017-16944",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-16944",
"Source": "CVE"
},
{
"RefID": "CVE-2018-6789",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-6789",
"Source": "CVE"
}
],
"Description": "This update upgrades exim to version 4.90.1-alt1. \nSecurity Fix(es):\n\n * BDU:2018-00088: Уязвимость функции receive_msg (receive.c) SMTP-демона почтового сервера Exim операционной системы Debian GNU/Linux, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код\n\n * BDU:2018-00395: Уязвимость функции base64d компонента STMP listener почтового сервера Exim, позволяющая нарушителю выполнить произвольный код\n\n * CVE-2016-1531: Exim before 4.86.2, when installed setuid root, allows local users to gain privileges via the perl_startup argument.\n\n * CVE-2016-9963: Exim before 4.87.1 might allow remote attackers to obtain the private DKIM signing key via vectors related to log files and bounce messages.\n\n * CVE-2017-1000369: Exim supports the use of multiple \"-p\" command line arguments which are malloc()'ed and never free()'ed, used in conjunction with other issues allows attackers to cause arbitrary code execution. This affects exim version 4.89 and earlier. Please note that at this time upstream has released a patch (commit 65e061b76867a9ea7aeeb535341b790b90ae6c21), but it is not known if a new point release is available that addresses this issue at this time.\n\n * CVE-2017-16943: The receive_msg function in receive.c in the SMTP daemon in Exim 4.88 and 4.89 allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free) via vectors involving BDAT commands.\n\n * CVE-2017-16944: The receive_msg function in receive.c in the SMTP daemon in Exim 4.88 and 4.89 allows remote attackers to cause a denial of service (infinite loop and stack exhaustion) via vectors involving BDAT commands and an improper check for a '.' character signifying the end of the content, related to the bdat_getc function.\n\n * CVE-2018-6789: An issue was discovered in the base64d function in the SMTP listener in Exim before 4.90.1. By sending a handcrafted message, a buffer overflow may happen. This can be used to execute code remotely.",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "Critical",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2018-03-12"
},
"Updated": {
"Date": "2018-03-12"
},
"BDUs": [
{
"ID": "BDU:2018-00088",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2018-00088",
"Impact": "Critical",
"Public": "20171123"
},
{
"ID": "BDU:2018-00395",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2018-00395",
"Impact": "Critical",
"Public": "20180205"
}
],
"CVEs": [
{
"ID": "CVE-2016-1531",
"CVSS": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-264",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-1531",
"Impact": "High",
"Public": "20160407"
},
{
"ID": "CVE-2016-9963",
"CVSS": "AV:N/AC:H/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-320",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-9963",
"Impact": "Low",
"Public": "20170201"
},
{
"ID": "CVE-2017-1000369",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"CWE": "CWE-404",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-1000369",
"Impact": "Low",
"Public": "20170619"
},
{
"ID": "CVE-2017-16943",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-16943",
"Impact": "Critical",
"Public": "20171125"
},
{
"ID": "CVE-2017-16944",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-835",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-16944",
"Impact": "High",
"Public": "20171125"
},
{
"ID": "CVE-2018-6789",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-6789",
"Impact": "Critical",
"Public": "20180208"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:spworkstation:8.4",
"cpe:/o:alt:spserver:8.4"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:3001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20181409001",
"Comment": "exim is earlier than 0:4.90.1-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20181409002",
"Comment": "exim-common is earlier than 0:4.90.1-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20181409003",
"Comment": "exim-heavy is earlier than 0:4.90.1-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20181409004",
"Comment": "exim-ldap is earlier than 0:4.90.1-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20181409005",
"Comment": "exim-light is earlier than 0:4.90.1-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20181409006",
"Comment": "exim-monitor is earlier than 0:4.90.1-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20181409007",
"Comment": "exim-mysql is earlier than 0:4.90.1-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20181409008",
"Comment": "exim-pgsql is earlier than 0:4.90.1-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20181409009",
"Comment": "exim-utils is earlier than 0:4.90.1-alt1"
}
]
}
]
}
}
]
}