Re: [exim] CVE-2019-15846: Exim - local or remote attacker can execute programs with root privileges.

2019-09-09 Thread Marco Gaiarin via Exim-users
Mandi! Dmitriy Matrosov via Exim-users In chel di` si favelave... > (Debian 6, 4.72, no $tls_sni, no $tls_in_sni) 4.72 is not vulnerable, as Heiko say in: https://www.bleepingcomputer.com/news/security/critical-exim-tls-flaw-lets-attackers-remotely-execute-commands-as-root/ -- Tut

Re: [exim] CVE-2019-15846: Exim - local or remote attacker can execute programs with root privileges

2019-09-09 Thread Phillip Carroll via Exim-users
On 9/9/2019 7:16 AM, Jan Ingvoldstad via Exim-users wrote: I've had another variant for years: acl_check_mail: deny message = no HELO given before MAIL command condition = ${if def:sender_helo_name {no}{yes}} delay = 60s The delay is a nice touch, if you have the TCP connectio

Re: [exim] CVE-2019-15846: Exim - local or remote attacker can execute programs with root privileges

2019-09-09 Thread Jan Ingvoldstad via Exim-users
Hello Konstantin, Please look at https://www.exim.org/exim-html-current/doc/html/spec_html/ch-access_control_lists.html and look at the description after “ delay = “ Jan (Sorry for top posting, editing sucks on cell) > 9. sep. 2019 kl. 16:37 skrev Konstantin Boyandin via Exim-users > : > >

Re: [exim] CVE-2019-15846: Exim - local or remote attacker can execute programs with root privileges

2019-09-09 Thread Konstantin Boyandin via Exim-users
Hello Jan, "delay" means tarpitting, in this context? I wonder how efficient that is. Sincerely, Konstantin On 09.09.2019 21:16, Jan Ingvoldstad via Exim-users wrote: > I've had another variant for years: > > acl_check_mail: > deny > message = no HELO given before MAIL command > cond

Re: [exim] CVE-2019-15846: Exim - local or remote attacker can execute programs with root privileges

2019-09-09 Thread Jan Ingvoldstad via Exim-users
I've had another variant for years: acl_check_mail: deny message = no HELO given before MAIL command condition = ${if def:sender_helo_name {no}{yes}} delay = 60s The delay is a nice touch, if you have the TCP connections to spare. Jan On Mon, Sep 9, 2019 at 4:10 PM Phillip Carroll

Re: [exim] CVE-2019-15846: Exim - local or remote attacker can execute programs with root privileges

2019-09-09 Thread Phillip Carroll via Exim-users
my configuration has had something similar for years. Is there any significant difference? acl_check_mail: # deny any mail without helo name denymessage = HELO required before MAIL condition = ${if eq{$sender_helo_name}{} {1}} (Yours obviously simpler to read) On 9/6/2019 6:1

Re: [exim] CVE-2019-15846: Exim - local or remote attacker can execute programs with root privileges.

2019-09-07 Thread Heiko Schlittermann via Exim-users
Dmitriy Matrosov via Exim-users (Sa 07 Sep 2019 10:39:20 CEST): > > > > And, if your Exim is linked against GnuTLS there is no $tls_sni variable > > at all. But - to my knowledge - the exploitable string is written to the > > -H spool file anyway (and read back). > > On Debian 7, 8, 9 (exim is li

Re: [exim] CVE-2019-15846: Exim - local or remote attacker can execute programs with root privileges

2019-09-07 Thread Cyborg via Exim-users
Am 07.09.19 um 03:16 schrieb Phil Pennock via Exim-users: > On 2019-09-06 at 22:04 +0200, Heiko Schlittermann via Exim-users wrote: >> The HELO ACL doesn't help either, as the first EHLO comes before >> STARTTLS, and the second EHLO doesn't have to come, the client may send > Oh pox. My memory is

Re: [exim] CVE-2019-15846: Exim - local or remote attacker can execute programs with root privileges.

2019-09-07 Thread Dmitriy Matrosov via Exim-users
On 9/7/19 9:51 AM, Heiko Schlittermann via Exim-users wrote: Marco Gaiarin via Exim-users (Fr 06 Sep 2019 23:42:03 CEST): Mandi! Heiko Schlittermann via Exim-users In chel di` si favelave... Add - as part of the mail ACL (the ACL referenced by the main config option "acl_smtp_mail"):

Re: [exim] CVE-2019-15846: Exim - local or remote attacker can execute programs with root privileges.

2019-09-07 Thread Heiko Schlittermann via Exim-users
Marco Gaiarin via Exim-users (Fr 06 Sep 2019 23:42:03 CEST): > Mandi! Heiko Schlittermann via Exim-users > In chel di` si favelave... > > > Add - as part of the mail ACL (the ACL referenced by the main config > > option "acl_smtp_mail"): > > denycondition = ${if eq{\\}{${substr{-1}{1}{

Re: [exim] CVE-2019-15846: Exim - local or remote attacker can execute programs with root privileges

2019-09-06 Thread Phil Pennock via Exim-users
On 2019-09-06 at 22:04 +0200, Heiko Schlittermann via Exim-users wrote: > The HELO ACL doesn't help either, as the first EHLO comes before > STARTTLS, and the second EHLO doesn't have to come, the client may send Oh pox. My memory is going. I hadn't realized that my protection against this comes

Re: [exim] CVE-2019-15846: Exim - local or remote attacker can execute programs with root privileges.

2019-09-06 Thread Marco Gaiarin via Exim-users
Mandi! Heiko Schlittermann via Exim-users In chel di` si favelave... > Add - as part of the mail ACL (the ACL referenced by the main config > option "acl_smtp_mail"): > denycondition = ${if eq{\\}{${substr{-1}{1}{$tls_in_sni > denycondition = ${if eq{\\}{${substr{-1}{1}{$tl

Re: [exim] CVE-2019-15846: Exim - local or remote attacker can execute programs with root privileges

2019-09-06 Thread Heiko Schlittermann via Exim-users
Sebastian Nielsen via Exim-users (Fr 06 Sep 2019 20:50:37 CEST): > Shouldn't this be in connect ACL? > How would the deny in MAIL FROM prevent the exploit? What I have understand > is that there is exploit in the SNI of the TLS negotiation, thus the whole > connect attempt must be rejected righ

Re: [exim] CVE-2019-15846: Exim - local or remote attacker can execute programs with root privileges

2019-09-06 Thread Heiko Schlittermann via Exim-users
Sebastian Nielsen via Exim-users (Fr 06 Sep 2019 21:37:41 CEST): > Ooo just that, forgot that... > > But still the question remains, how does it prevent the exploit? Doesn't the > exploit (root command) get executed immidiately when TLS negotiation is > done? This is left as an exercise to the r

Re: [exim] CVE-2019-15846: Exim - local or remote attacker can execute programs with root privileges

2019-09-06 Thread Sebastian Nielsen via Exim-users
19 21:35 Till: exim-users@exim.org Ämne: Re: [exim] CVE-2019-15846: Exim - local or remote attacker can execute programs with root privileges Am 06.09.19 um 20:50 schrieb Sebastian Nielsen via Exim-users: > Shouldn't this be in connect ACL? > How would the deny in MAIL FROM prevent the

Re: [exim] CVE-2019-15846: Exim - local or remote attacker can execute programs with root privileges

2019-09-06 Thread Cyborg via Exim-users
Am 06.09.19 um 20:50 schrieb Sebastian Nielsen via Exim-users: > Shouldn't this be in connect ACL? > How would the deny in MAIL FROM prevent the exploit? What I have understand > is that there is exploit in the SNI of the TLS negotiation, thus the whole > connect attempt must be rejected right? >

Re: [exim] CVE-2019-15846: Exim - local or remote attacker can execute programs with root privileges

2019-09-06 Thread Sebastian Nielsen via Exim-users
Heiko Schlittermann via Exim-users Skickat: den 6 september 2019 13:22 Till: oss-security ; Exim Users Ämne: Re: [exim] CVE-2019-15846: Exim - local or remote attacker can execute programs with root privileges An Update to the mitigation for the current CVE: Add - as part of the mail ACL (the ACL refer

Re: [exim] CVE-2019-15846: Exim - local or remote attacker can execute programs with root privileges.

2019-09-06 Thread Cyborg via Exim-users
Am 06.09.19 um 13:14 schrieb Heiko Schlittermann via Exim-users: > An Update to the mitigation for the current CVE: > > Add - as part of the mail ACL (the ACL referenced by the main config > option "acl_smtp_mail"): > > denycondition = ${if eq{\\}{${substr{-1}{1}{$tls_in_sni > den

Re: [exim] CVE-2019-15846: Exim - local or remote attacker can execute programs with root privileges.

2019-09-06 Thread Heiko Schlittermann via Exim-users
CVE ID: CVE-2019-15846 Credits:Zerons , Qualys Version(s): all versions up to and including 4.92.1 Issue: The SMTP Delivery process in all¹ versions up to and including Exim 4.92.1 has a Buffer Overflow. In the default runtime configuration, this is exploitable

Re: [exim] CVE-2019-15846: Exim - local or remote attacker can execute programs with root privileges.

2019-09-06 Thread Heiko Schlittermann via Exim-users
An Update to the mitigation for the current CVE: Add - as part of the mail ACL (the ACL referenced by the main config option "acl_smtp_mail"): denycondition = ${if eq{\\}{${substr{-1}{1}{$tls_in_sni denycondition = ${if eq{\\}{${substr{-1}{1}{$tls_in_peerdn This should

Re: [exim] CVE-2019-15846: Exim - local or remote attacker can execute programs with root privileges.

2019-09-06 Thread Heiko Schlittermann via Exim-users
Heiko Schlittermann (Fr 06 Sep 2019 12:20:39 CEST): > Mitigation > == > > Do not offer TLS for incomming connections (tls_advertise_hosts). > This mitigation is *not* recommended! This should block the most popular attack vector: In your MAIL ACL: denycondition = ${if eq{\\}{${

Re: [exim] CVE-2019-15846: Exim - local or remote attacker can execute programs with root privileges.

2019-09-05 Thread Heiko Schlittermann via Exim-users
*** Note: EMBARGO is still in effect! *** *** Distros must not publish any detail yet *** In case you are entitled to access the security repo: *and* use the 4.92.2+fixes branch: The branch got two new commits, fixing a small tool. This tool is not designed to process untrusted data, so the

[exim] CVE-2019-15846: Exim - local or remote attacker can execute programs with root privileges.

2019-09-04 Thread Heiko Schlittermann via Exim-users
*** Note: EMBARGO is still in effect! *** *** Distros must not publish any detail yet *** Head up! Security release ahead! CVE ID: CVE-2019-15846 Version(s): up to and including 4.92.1 Issue: A local or remote attacker can execute programs with root privileges. Details: