Debians sikkerhedsbulletin
DSA-2154-1 exim4 -- rettighedsforøgelse
- Rapporteret den:
- 30. jan 2011
- Berørte pakker:
- exim4
- Sårbar:
- Ja
- Referencer i sikkerhedsdatabaser:
- I Mitres CVE-ordbog: CVE-2010-4345, CVE-2011-0017.
- Yderligere oplysninger:
-
En designfejl (CVE-2010-4345) i exim4 gjorde det muligt for den lokale Debian-exim-bruger at få rootrettigheder ved at angive en alternativ opsætningsfil ved anvendelse af parameteret -C eller ved hjælp af muligheden for at overtrume makroer (parameteret -D). Desværre er det ikke muligt at retter sårbarheden unden at foretage ændringer i hvordan exim4 opfører sig. Hvis du anvender parametrene -C eller -D eller mulighed for at lave systemfiltre, bør du nøje gennemse ændringerne og tilpasse din opsætning tilsvarende. Debians standardopsætning er ikke påvirket af ændringerne.
Den detaljerede liste over ændringer er beskrevet i filen NEWS.Debian i pakkerne. De relevante afsnit er også gengivet herunder.
Desuden medførte manglende fejlhåndtering af systemkaldene setuid/setgid det muligt for Debian-exim-brugeren at få root til at tilføje logdata til vilkårlige filer (CVE-2011-0017).
I den stabile distribution (lenny), er disse problemer rettet i version 4.69-9+lenny3.
I distributionen testing (squeeze) og i den ustabile distribution (sid), er disse problemer rettet i version 4.72-4.
Ikke-oversat uddrag fra filen NEWS.Debian, fra pakkerne exim4-daemon-light og exim4-daemon-heavy:
Exim versions up to and including 4.72 are vulnerable to CVE-2010-4345. This is a rettighedsforøgelse issue that allows the exim user to gain root privileges by specifying an alternate configuration file using the -C option. The macro override facility (-D) might also be misused for this purpose. In reaction to this security vulnerability upstream has made a number of user visible changes. This package includes these changes. If exim is invoked with the -C or -D option the daemon will not regain root privileges though re-execution. This is usually necessary for local delivery, though. Therefore it is generally not possible anymore to run an exim daemon with -D or -C options. However this version of exim has been built with TRUSTED_CONFIG_LIST=/etc/exim4/trusted_configs. TRUSTED_CONFIG_LIST defines a list of configuration files which are trusted; if a config file is owned by root and matches a pathname in the list, then it may be invoked by the Exim build-time user without Exim relinquishing root privileges. As a hotfix to not break existing installations of mailscanner we have also set WHITELIST_D_MACROS=OUTGOING. i.e. it is still possible to start exim with -DOUTGOING while being able to do local deliveries. If you previously were using -D switches you will need to change your setup to use a separate configuration file. The ".include" mechanism makes this easy. The system filter is run as exim_user instead of root by default. If your setup requies root privileges when running the system filter you will need to set the system_filter_user exim main configuration option.