Activity Stream
48,167 MEMBERS
63118 ONLINE
besthostingforums On YouTube Subscribe to our Newsletter besthostingforums On Twitter besthostingforums On Facebook besthostingforums On facebook groups

Results 1 to 4 of 4
  1.     
    #1
    Banned
    Website's:
    KWWHunction.com

    Default Security exploit identified in Exim

    cPanel?s security team has detected a critical exploit on the Exim MTA (Mail Transfer Agent) used on cPanel & WHT. The exploit could potentially allow an attacker to obtain root privileges remotely. All cPanel Servers using the default Exim configuration are vulnerable. In order to update Exim with a fix please execute the command : /scripts/eximup.
    You will find additional details in the communication sent by cPanel below:

    =============
    Summary
    =============
    A privilege escalation vulnerability exists in Exim, the mail transfer agent used by cPanel& WHM.
    ????????
    Security Rating
    ????????
    This update has been rated as Critical by the cPanel Security team.
    Description
    ????????
    Research up to this point indicates the exploit is a buffer overflow vulnerability that takes advantage of the default Exim configuration settings related to altering Exim?s runtime configuration file along with overriding the macro definitions in the configuration file. This buffer overflow may lead to arbitrary code execution with the privileges of the user executing the Exim daemon. However, the Exim user retains root privileges when running the -C and -D command line flags. Through the creation of a temporary exim configuration which is processed with the -C or -D flags, the Exim user is able to execute arbitrary commands as root.
    Solution
    ????????
    To resolve and work around the issue, for Linux-based systems cPanel has issued new Exim RPMs. The new version of Exim locks configuration file locations to the /etc/exim prefix as well as disabling use of the -D flag. Server Owners are strongly urged to upgrade to the following Exim RPM versions:
    ? Systems configured to use Maildir: Exim 4.69-25
    ? Systems configured to use mbox (deprecated): Exim 4.63-4
    Exim RPMs will be distributed through cPanel?s package management system. All cPanel& WHM servers receiving updates automatically will receive the updated Exim RPM during normal update and maintenance operations (upcp). If you prefer to install the update right now, please run the following in a root shell:
    /scripts/eximup
    On cPanel& WHM FreeBSD servers, Exim is an unmanaged install performed from the Ports system. To apply a like setup on FreeBSD systems, server administrators will need to perform the following manual configuration:
    ? Remove WITHOUT_ALT_CONFIG_PREFIX=yes from /etc/make.conf
    ? Add the following to /var/db/ports/exim/options
    WITH_ALT_CONFIG_PREFIX=true
    SEDLIST+= -e ?s,^(ALT_CONFIG_PREFIX.*,\1/etc/exim,?
    SEDLIST+= -e ?s,^\# (DISABLE_D_OPTION,\1,?
    ? Change directory to /usr/ports/mail/exim
    ? Execute ?make deinstall?
    ? Execute ?make install?
    Caution: the above changes have potential to be undone by /scripts/checkmakeconf, and updates to the Exim port. An upcoming version of cPanel& WHM 11.28 will resolve this for FreeBSD users.
    References
    ????????
    http://docs.cpanel.net/twiki/bin/vie...SecurityLevels
    http://www.exim.org/lurker/message/2...32d4f2.en.html
    DLow Reviewed by DLow on . Security exploit identified in Exim cPanel?s security team has detected a critical exploit on the Exim MTA (Mail Transfer Agent) used on cPanel & WHT. The exploit could potentially allow an attacker to obtain root privileges remotely. All cPanel Servers using the default Exim configuration are vulnerable. In order to update Exim with a fix please execute the command : /scripts/eximup. You will find additional details in the communication sent by cPanel below: ============= Summary ============= A privilege Rating: 5

  2.   Sponsored Links

  3.     
    #2
    Member
    Website's:
    Elite.SO Defendos.com Motionite.com
    My Exim was already up to date. Thanks for the info.

    Defendos BETA3 Released! Thread - Official Website

  4.     
    #3
    Member
    Is this old or has it happened again?

    Edit: oh, it's for FreeBSD...

  5.     
    #4
    Banned
    Website's:
    KWWHunction.com
    Agian unfortunatelly

Thread Information

Users Browsing this Thread

There are currently 1 users browsing this thread. (0 members and 1 guests)

Similar Threads

  1. WHMCS Security Exploit+Patch
    By Glenn in forum News & Current Events
    Replies: 6
    Last Post: 8th Dec 2011, 01:59 AM
  2. Replies: 3
    Last Post: 8th Nov 2011, 03:54 AM
  3. DMCA Sniffer Identified!
    By Gonzo1136 in forum Webmaster Discussion
    Replies: 3
    Last Post: 6th Aug 2011, 01:12 AM
  4. [Selling] [Exploit] Hot Exclusive YouTube Exploit [New]
    By Goob3r in forum Completed Transactions
    Replies: 1
    Last Post: 24th Aug 2010, 04:21 PM
  5. VBSEO----Problem (Links are not identified)
    By Arthur in forum vBulletin
    Replies: 9
    Last Post: 30th Jul 2010, 09:15 AM

Tags for this Thread

BE SOCIAL