<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for exim</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2017:2289-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2017-08-29T11:27:33Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2017-08-29T11:27:33Z</InitialReleaseDate>
    <CurrentReleaseDate>2017-08-29T11:27:33Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for exim</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for exim fixes the following issues:

Changes in exim:
- specify users with ref:mail, to make them dynamic. (boo#1046971)

- CVE-2017-1000369: Fixed memory leaks that could be
  exploited to 'stack crash' local privilege escalation (boo#1044692)
- Require user(mail) group(mail) to meet new users handling in TW.
- Prerequire permissions (fixes rpmlint).

- conditionally disable DANE on SuSE versions with OpenSSL &lt; 1.0
- CVE-2016-1531: when installed setuid root, allows local users to gain privileges via the perl_startup
      argument. 
- CVE-2016-9963: DKIM information leakage (boo#1015930)
  

- Makefile tuning:
    + add sqlite support
    + disable WITH_OLD_DEMIME
    + enable AUTH_CYRUS_SASL
    + enable AUTH_TLS
    + enable SYSLOG_LONG_LINES
    + enable SUPPORT_PAM
    + MAX_NAMED_LIST=64
    + enable EXPERIMENTAL_DMARC
    + enable EXPERIMENTAL_EVENT
    + enable EXPERIMENTAL_PROXY
    + enable EXPERIMENTAL_CERTNAMES
    + enable EXPERIMENTAL_DSN
    + enable EXPERIMENTAL_DANE
    + enable EXPERIMENTAL_SOCKS
    + enable EXPERIMENTAL_INTERNATIONAL
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00072.html</URL>
      <Description>E-Mail link for openSUSE-SU-2017:2289-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Leap 42.2">
      <Branch Type="Product Name" Name="openSUSE Leap 42.2">
        <FullProductName ProductID="openSUSE Leap 42.2">openSUSE Leap 42.2</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="openSUSE Leap 42.3">
      <Branch Type="Product Name" Name="openSUSE Leap 42.3">
        <FullProductName ProductID="openSUSE Leap 42.3">openSUSE Leap 42.3</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="exim-4.86.2-14.1">
      <FullProductName ProductID="exim-4.86.2-14.1">exim-4.86.2-14.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="eximon-4.86.2-14.1">
      <FullProductName ProductID="eximon-4.86.2-14.1">eximon-4.86.2-14.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="eximstats-html-4.86.2-14.1">
      <FullProductName ProductID="eximstats-html-4.86.2-14.1">eximstats-html-4.86.2-14.1</FullProductName>
    </Branch>
    <Relationship ProductReference="exim-4.86.2-14.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:exim-4.86.2-14.1">exim-4.86.2-14.1 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="eximon-4.86.2-14.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:eximon-4.86.2-14.1">eximon-4.86.2-14.1 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="eximstats-html-4.86.2-14.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:eximstats-html-4.86.2-14.1">eximstats-html-4.86.2-14.1 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="exim-4.86.2-14.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:exim-4.86.2-14.1">exim-4.86.2-14.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="eximon-4.86.2-14.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:eximon-4.86.2-14.1">eximon-4.86.2-14.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="eximstats-html-4.86.2-14.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:eximstats-html-4.86.2-14.1">eximstats-html-4.86.2-14.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Exim before 4.86.2, when installed setuid root, allows local users to gain privileges via the perl_startup argument.</Note>
    </Notes>
    <CVE>CVE-2016-1531</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:exim-4.86.2-14.1</ProductID>
        <ProductID>openSUSE Leap 42.2:eximon-4.86.2-14.1</ProductID>
        <ProductID>openSUSE Leap 42.2:eximstats-html-4.86.2-14.1</ProductID>
        <ProductID>openSUSE Leap 42.3:exim-4.86.2-14.1</ProductID>
        <ProductID>openSUSE Leap 42.3:eximon-4.86.2-14.1</ProductID>
        <ProductID>openSUSE Leap 42.3:eximstats-html-4.86.2-14.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:L/AC:L/Au:S/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00072.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-1531.html</URL>
        <Description>CVE-2016-1531</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/968844</URL>
        <Description>SUSE Bug 968844</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Exim before 4.87.1 might allow remote attackers to obtain the private DKIM signing key via vectors related to log files and bounce messages.</Note>
    </Notes>
    <CVE>CVE-2016-9963</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:exim-4.86.2-14.1</ProductID>
        <ProductID>openSUSE Leap 42.2:eximon-4.86.2-14.1</ProductID>
        <ProductID>openSUSE Leap 42.2:eximstats-html-4.86.2-14.1</ProductID>
        <ProductID>openSUSE Leap 42.3:exim-4.86.2-14.1</ProductID>
        <ProductID>openSUSE Leap 42.3:eximon-4.86.2-14.1</ProductID>
        <ProductID>openSUSE Leap 42.3:eximstats-html-4.86.2-14.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00072.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-9963.html</URL>
        <Description>CVE-2016-9963</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015930</URL>
        <Description>SUSE Bug 1015930</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1053919</URL>
        <Description>SUSE Bug 1053919</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Exim supports the use of multiple "-p" command line arguments which are malloc()'ed and never free()'ed, used in conjunction with other issues allows attackers to cause arbitrary code execution. This affects exim version 4.89 and earlier. Please note that at this time upstream has released a patch (commit 65e061b76867a9ea7aeeb535341b790b90ae6c21), but it is not known if a new point release is available that addresses this issue at this time.</Note>
    </Notes>
    <CVE>CVE-2017-1000369</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:exim-4.86.2-14.1</ProductID>
        <ProductID>openSUSE Leap 42.2:eximon-4.86.2-14.1</ProductID>
        <ProductID>openSUSE Leap 42.2:eximstats-html-4.86.2-14.1</ProductID>
        <ProductID>openSUSE Leap 42.3:exim-4.86.2-14.1</ProductID>
        <ProductID>openSUSE Leap 42.3:eximon-4.86.2-14.1</ProductID>
        <ProductID>openSUSE Leap 42.3:eximstats-html-4.86.2-14.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00072.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-1000369.html</URL>
        <Description>CVE-2017-1000369</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1037551</URL>
        <Description>SUSE Bug 1037551</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1044692</URL>
        <Description>SUSE Bug 1044692</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
