FreeBSD : Exim -- remote code execution (b0f3ab1f-1f3b-11e2-8fe9-0022156e8794)

This script is Copyright (C) 2012-2013 Tenable Network Security, Inc.


Synopsis :

The remote FreeBSD host is missing a security-related update.

Description :

This vulnerability affects Exim instances built with DKIM enabled
(this is the default for FreeBSD Exim port) and running verification
of DKIM signatures on the incoming mail messages.

Phil Penncock reports :

This is a SECURITY release, addressing a CRITICAL remote code
execution flaw in versions of Exim between 4.70 and 4.80 inclusive,
when built with DKIM support (the default).

This security vulnerability can be exploited by anyone who can send
email from a domain for which they control the DNS.

You are not vulnerable if you built Exim with DISABLE_DKIM or if you
put this at the start of an ACL plumbed into acl_smtp_connect or
acl_smtp_rcpt : warn control = dkim_disable_verify

See also :

https://lists.exim.org/lurker/message/20121026.080330.74b9147b.en.html
http://www.nessus.org/u?eb7a2011

Solution :

Update the affected package.

Risk factor :

Medium / CVSS Base Score : 6.8
(CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P)

Family: FreeBSD Local Security Checks

Nessus Plugin ID: 62706 ()

Bugtraq ID:

CVE ID: CVE-2012-5671

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now