In Exim 4.90 and earlier, there is a buffer overflow in an utility function, if some pre-conditions are met. Using a handcrafted message, remote code execution seems to be possible. More information to follow. Upstream advisory: https://exim.org/static/doc/security/CVE-2018-6789.txt Additional References: https://bugzilla.novell.com/show_bug.cgi?id=1079832 http://seclists.org/oss-sec/2018/q1/133
Created exim tracking bugs for this issue: Affects: epel-all [bug 1543269] Affects: fedora-all [bug 1543270]
Upstream commit: https://github.com/Exim/exim/commit/cf3cd306062a08969c41a1cdd32c6855f1abecf1
The issue here is a buffer overflow in the b64decode() function, that seems to be limited to just one byte. It's triggered when Base64 encoded input to decode does not have proper length (multiple of 4). Attacker controlled byte is written past of the buffer.
External References: https://exim.org/static/doc/security/CVE-2018-6789.txt https://devco.re/blog/2018/03/06/exim-off-by-one-RCE-exploiting-CVE-2018-6789-en/
Statement: This issue affects the versions of Exim as shipped in Red Hat Enterprise Linux 5. Red Hat Enterprise Linux 5 is already in the Extended Life Phase of its life cycle and Exim is not on the list of components supported via Red Hat Enterprise Linux 5 Extended Life-cycle Support (ELS) add-on, therefore there's currently no plan to address this issue in Red Hat Enterprise Linux 5. For more information about Red Hat Enterprise Linux 5 life cycle and ELS add-on scope of support, see: https://access.redhat.com/support/policy/updates/errata/#Extended_Life_Cycle_Phase https://access.redhat.com/articles/2901071 The Exim mail server is not shipped in Red Hat Enterprise Linux 6 and 7.