From noreply at opencsw.org Fri Mar 9 16:32:39 2018 From: noreply at opencsw.org (Mantis Bug Tracker) Date: Fri, 9 Mar 2018 16:32:39 +0100 Subject: [exim 0005317]: EXIM CVE-2018-6789 Message-ID: <1b7839b6e36460153f44f3697dc6690f@www.opencsw.org> The following issue has been SUBMITTED. ====================================================================== https://www.opencsw.org/mantis/view.php?id=5317 ====================================================================== Reported By: barlavento Assigned To: ====================================================================== Project: exim Issue ID: 5317 Category: upgrade Reproducibility: unable to reproduce Severity: major Priority: normal Status: new ====================================================================== Date Submitted: 2018-03-09 16:32 CET Last Modified: 2018-03-09 16:32 CET ====================================================================== Summary: EXIM CVE-2018-6789 Description: CVE-2018-6789 ============= There is a buffer overflow in base64d(), if some pre-conditions are met. Using a handcrafted message, remote code execution seems to be possible. A patch exists already and is being tested. Currently we're unsure about the severity, we *believe*, an exploit is difficult. A mitigation isn't known. Timeline (UTC) -------------- * 2018-02-05 Report from Meh Chang via exim-security mailing list * 2018-02-06 Request CVE on https://cveform.mitre.org/ (heiko) CVE-2018-6789 * 2018-02-07 Announcement to the public via exim-users, exim-maintainers mailing lists and on oss-security mailing list * 2018-02-08 16:50 Grant restricted access to the security repo for distro maintainers * 2018-02-09 One distro breaks the embargo * 2018-02-10 18:00 Grant public access to the our official git repo. ====================================================================== From noreply at opencsw.org Tue Mar 20 11:04:37 2018 From: noreply at opencsw.org (Mantis Bug Tracker) Date: Tue, 20 Mar 2018 11:04:37 +0100 Subject: [exim 0005317]: EXIM CVE-2018-6789 In-Reply-To: <603921662774d622a4b96622c8eb8d54> Message-ID: <0dd3021fc2d3529ee186fd86e57c0dd1@www.opencsw.org> A NOTE has been added to this issue. ====================================================================== https://www.opencsw.org/mantis/view.php?id=5317 ====================================================================== Reported By: barlavento Assigned To: ====================================================================== Project: exim Issue ID: 5317 Category: upgrade Reproducibility: unable to reproduce Severity: major Priority: normal Status: new ====================================================================== Date Submitted: 2018-03-09 16:32 CET Last Modified: 2018-03-20 11:04 CET ====================================================================== Summary: EXIM CVE-2018-6789 Description: CVE-2018-6789 ============= There is a buffer overflow in base64d(), if some pre-conditions are met. Using a handcrafted message, remote code execution seems to be possible. A patch exists already and is being tested. Currently we're unsure about the severity, we *believe*, an exploit is difficult. A mitigation isn't known. Timeline (UTC) -------------- * 2018-02-05 Report from Meh Chang via exim-security mailing list * 2018-02-06 Request CVE on https://cveform.mitre.org/ (heiko) CVE-2018-6789 * 2018-02-07 Announcement to the public via exim-users, exim-maintainers mailing lists and on oss-security mailing list * 2018-02-08 16:50 Grant restricted access to the security repo for distro maintainers * 2018-02-09 One distro breaks the embargo * 2018-02-10 18:00 Grant public access to the our official git repo. ====================================================================== ---------------------------------------------------------------------- (0011270) dam (administrator) - 2018-03-20 11:04 https://www.opencsw.org/mantis/view.php?id=5317#c11270 ---------------------------------------------------------------------- Unfortunately the current maintainer is no longer active. If you would be willing to help I'll gladly accept a patch. The current recipe is available here: https://buildfarm.opencsw.org/source/xref/opencsw/csw/mgar/pkg/exim/trunk/Makefile From noreply at opencsw.org Wed Mar 21 08:31:54 2018 From: noreply at opencsw.org (Mantis Bug Tracker) Date: Wed, 21 Mar 2018 08:31:54 +0100 Subject: [exim 0005317]: EXIM CVE-2018-6789 In-Reply-To: <603921662774d622a4b96622c8eb8d54> Message-ID: <1efd3ad1eed868ba1fa9148f77522146@www.opencsw.org> A NOTE has been added to this issue. ====================================================================== https://www.opencsw.org/mantis/view.php?id=5317 ====================================================================== Reported By: barlavento Assigned To: ====================================================================== Project: exim Issue ID: 5317 Category: upgrade Reproducibility: unable to reproduce Severity: major Priority: normal Status: new ====================================================================== Date Submitted: 2018-03-09 16:32 CET Last Modified: 2018-03-21 08:31 CET ====================================================================== Summary: EXIM CVE-2018-6789 Description: CVE-2018-6789 ============= There is a buffer overflow in base64d(), if some pre-conditions are met. Using a handcrafted message, remote code execution seems to be possible. A patch exists already and is being tested. Currently we're unsure about the severity, we *believe*, an exploit is difficult. A mitigation isn't known. Timeline (UTC) -------------- * 2018-02-05 Report from Meh Chang via exim-security mailing list * 2018-02-06 Request CVE on https://cveform.mitre.org/ (heiko) CVE-2018-6789 * 2018-02-07 Announcement to the public via exim-users, exim-maintainers mailing lists and on oss-security mailing list * 2018-02-08 16:50 Grant restricted access to the security repo for distro maintainers * 2018-02-09 One distro breaks the embargo * 2018-02-10 18:00 Grant public access to the our official git repo. ====================================================================== ---------------------------------------------------------------------- (0011271) barlavento (reporter) - 2018-03-21 08:31 https://www.opencsw.org/mantis/view.php?id=5317#c11271 ---------------------------------------------------------------------- Hello I am willing to help. what is needed from me? But maybe it is easier to just compile from the new source rather than patch the old code? Eduardo From noreply at opencsw.org Wed Mar 21 09:28:59 2018 From: noreply at opencsw.org (Mantis Bug Tracker) Date: Wed, 21 Mar 2018 09:28:59 +0100 Subject: [exim 0005317]: EXIM CVE-2018-6789 In-Reply-To: <603921662774d622a4b96622c8eb8d54> Message-ID: <58c56f218b126043003642574c439309@www.opencsw.org> A NOTE has been added to this issue. ====================================================================== https://www.opencsw.org/mantis/view.php?id=5317 ====================================================================== Reported By: barlavento Assigned To: ====================================================================== Project: exim Issue ID: 5317 Category: upgrade Reproducibility: unable to reproduce Severity: major Priority: normal Status: new ====================================================================== Date Submitted: 2018-03-09 16:32 CET Last Modified: 2018-03-21 09:28 CET ====================================================================== Summary: EXIM CVE-2018-6789 Description: CVE-2018-6789 ============= There is a buffer overflow in base64d(), if some pre-conditions are met. Using a handcrafted message, remote code execution seems to be possible. A patch exists already and is being tested. Currently we're unsure about the severity, we *believe*, an exploit is difficult. A mitigation isn't known. Timeline (UTC) -------------- * 2018-02-05 Report from Meh Chang via exim-security mailing list * 2018-02-06 Request CVE on https://cveform.mitre.org/ (heiko) CVE-2018-6789 * 2018-02-07 Announcement to the public via exim-users, exim-maintainers mailing lists and on oss-security mailing list * 2018-02-08 16:50 Grant restricted access to the security repo for distro maintainers * 2018-02-09 One distro breaks the embargo * 2018-02-10 18:00 Grant public access to the our official git repo. ====================================================================== ---------------------------------------------------------------------- (0011272) dam (administrator) - 2018-03-21 09:28 https://www.opencsw.org/mantis/view.php?id=5317#c11272 ---------------------------------------------------------------------- Hi Eduardo, mainly this patch needs to be forward-ported to be applicable to the current version: https://buildfarm.opencsw.org/source/xref/opencsw/csw/mgar/pkg/exim/trunk/files/0003-Set-OpenCSW-build-options.patch If you could do that then it should be fairly easy. From noreply at opencsw.org Wed Mar 21 16:31:32 2018 From: noreply at opencsw.org (Mantis Bug Tracker) Date: Wed, 21 Mar 2018 16:31:32 +0100 Subject: [exim 0005317]: EXIM CVE-2018-6789 In-Reply-To: <603921662774d622a4b96622c8eb8d54> Message-ID: <114afc4bbe1a40fd5e8060b454d2e15d@www.opencsw.org> A NOTE has been added to this issue. ====================================================================== https://www.opencsw.org/mantis/view.php?id=5317 ====================================================================== Reported By: barlavento Assigned To: ====================================================================== Project: exim Issue ID: 5317 Category: upgrade Reproducibility: unable to reproduce Severity: major Priority: normal Status: new ====================================================================== Date Submitted: 2018-03-09 16:32 CET Last Modified: 2018-03-21 16:31 CET ====================================================================== Summary: EXIM CVE-2018-6789 Description: CVE-2018-6789 ============= There is a buffer overflow in base64d(), if some pre-conditions are met. Using a handcrafted message, remote code execution seems to be possible. A patch exists already and is being tested. Currently we're unsure about the severity, we *believe*, an exploit is difficult. A mitigation isn't known. Timeline (UTC) -------------- * 2018-02-05 Report from Meh Chang via exim-security mailing list * 2018-02-06 Request CVE on https://cveform.mitre.org/ (heiko) CVE-2018-6789 * 2018-02-07 Announcement to the public via exim-users, exim-maintainers mailing lists and on oss-security mailing list * 2018-02-08 16:50 Grant restricted access to the security repo for distro maintainers * 2018-02-09 One distro breaks the embargo * 2018-02-10 18:00 Grant public access to the our official git repo. ====================================================================== ---------------------------------------------------------------------- (0011273) barlavento (reporter) - 2018-03-21 16:31 https://www.opencsw.org/mantis/view.php?id=5317#c11273 ---------------------------------------------------------------------- I have to study on this, because this is new to me. Probably need to read some documentation first?