{"id":773,"date":"2021-07-23T12:37:48","date_gmt":"2021-07-23T12:37:48","guid":{"rendered":"https:\/\/ssdsunucum.com\/blog\/cve-2017-16943-and-cve-2017-16944-exim\/"},"modified":"2021-07-23T12:37:48","modified_gmt":"2021-07-23T12:37:48","slug":"cve-2017-16943-and-cve-2017-16944-exim","status":"publish","type":"post","link":"https:\/\/ssdsunucum.com\/blog\/cve-2017-16943-and-cve-2017-16944-exim\/","title":{"rendered":"CVE 2017 16943 and CVE 2017 16944 Exim"},"content":{"rendered":"<\/p>\n<div class=\"col-md-9\">\n<div class=\"flex-column flex-md-row article-header\"><\/div>\n<hr>\n<h2 id=\"background-information\">Background Information<\/h2>\n<p>On Friday, November 24 2017, Exim announced two vulnerabilities in versions 4.88 and later.<\/p>\n<h2 id=\"impact\">Impact<\/h2>\n<p>According to Exim development: \u201cA remote code execution vulnerability has been reported in Exim, with immediate public disclosure (we were given no private notice).\u201d<\/p>\n<p>The vulnerability exists in the ESMTP CHUNKING extension, and an additional DoS vulnerability exists in the same subsystem. On supported cPanel &#038; WHM versions, chunking_advertise_hosts is set to an un-routable IP address by default. That technique appears to prevent the remote exploitation of the vulnerabilities.<\/p>\n<p>On further investigation, we became concerned that local users may still be able to abuse this configuration. Accordingly, we published an autofixer on Monday, November 27 2017, to fully disable chunking support in Exim. This would have run during Monday\u2019s nightly maintenance, and can be confirmed by running the following as root via SSH:\n<\/p>\n<div class=\"highlight\">\n<pre style=\"color:#f8f8f2;background-color:#272822;-moz-tab-size:4;-o-tab-size:4;tab-size:4\"><code class=\"language-perl\" data-lang=\"perl\"><span style=\"color:#e6db74\">\/scripts\/<\/span>autorepair exim_disable_chunking<\/code><\/pre>\n<\/div>\n<h2 id=\"releases\">Releases<\/h2>\n<p>The following versions of cPanel &#038; WHM were patched to have the correct version of Exim.<\/p>\n<ul>\n<li>\n<p>68 \u2014 68.0.20<\/p>\n<\/li>\n<li>\n<p>62 \u2014 62.0.36<\/p>\n<\/li>\n<li>\n<p>EDGE \u2014 68.0.20<\/p>\n<\/li>\n<li>\n<p>CURRENT \u2014 68.0.20<\/p>\n<\/li>\n<li>\n<p>RELEASE \u2014 68.0.20<\/p>\n<\/li>\n<li>\n<p>STABLE \u2014 68.0.20<\/p>\n<\/li>\n<\/ul>\n<h2 id=\"how-to-determine-if-your-server-is-up-to-date\">How to determine if your server is up to date<\/h2>\n<p>The updated RPMs provided by cPanel will contain a changelog entry with the CVE number. You can check for this changelog entry with the following command: <\/p>\n<div class=\"highlight\">\n<pre style=\"color:#f8f8f2;background-color:#272822;-moz-tab-size:4;-o-tab-size:4;tab-size:4\"><code class=\"language-perl\" data-lang=\"perl\">rpm <span style=\"color:#f92672\">-<\/span><span style=\"color:#e6db74\">q --changelog <\/span>exim <span style=\"color:#f92672\">|<\/span> grep CVE<span style=\"color:#f92672\">-<\/span><span style=\"color:#ae81ff\">2017<\/span><span style=\"color:#f92672\">-<\/span><span style=\"color:#ae81ff\">16943<\/span><\/code><\/pre>\n<\/div>\n<p>The output should resemble below: <\/p>\n<div class=\"highlight\">\n<pre style=\"color:#f8f8f2;background-color:#272822;-moz-tab-size:4;-o-tab-size:4;tab-size:4\"><code class=\"language-perl\" data-lang=\"perl\"><span style=\"color:#f92672\">-<\/span> Applied patch <span style=\"color:#66d9ef\">for<\/span> CVE<span style=\"color:#f92672\">-<\/span><span style=\"color:#ae81ff\">2017<\/span><span style=\"color:#f92672\">-<\/span><span style=\"color:#ae81ff\">16943<\/span> <span style=\"color:#f92672\">and<\/span> CVE<span style=\"color:#f92672\">-<\/span><span style=\"color:#ae81ff\">2017<\/span><span style=\"color:#f92672\">-<\/span><span style=\"color:#ae81ff\">16944<\/span><\/code><\/pre>\n<\/div>\n<h2 id=\"what-to-do-if-you-are-not-up-to-date\">What to do if you are not up to date<\/h2>\n<p>If your server is not running one of the above versions, update immediately.<\/p>\n<p>To upgrade your server, use WHM\u2019s <em>Upgrade to Latest Version<\/em> interface (<em>WHM &gt;&gt; Home &gt;&gt; cPanel &gt;&gt; Upgrade to Latest Version<\/em>).<\/p>\n<p>Alternatively, you can run the below commands to upgrade your server from the command line: <\/p>\n<div class=\"highlight\">\n<div style=\"color:#f8f8f2;background-color:#272822;-moz-tab-size:4;-o-tab-size:4;tab-size:4\">\n<table style=\"border-spacing:0;padding:0;margin:0;border:0;width:auto;overflow:auto;display:block;\">\n<tr>\n<td style=\"vertical-align:top;padding:0;margin:0;border:0;\">\n<pre style=\"color:#f8f8f2;background-color:#272822;-moz-tab-size:4;-o-tab-size:4;tab-size:4\"><code class=\"language-go\" data-lang=\"go\"><span style=\"margin-right:0.4em;padding:0 0.4em 0 0.4em;color:#7f7f7f\">1\n<\/span><span style=\"margin-right:0.4em;padding:0 0.4em 0 0.4em;color:#7f7f7f\">2\n<\/span><\/code><\/pre>\n<\/td>\n<td style=\"vertical-align:top;padding:0;margin:0;border:0;;width:100%\">\n<pre style=\"color:#f8f8f2;background-color:#272822;-moz-tab-size:4;-o-tab-size:4;tab-size:4\"><code class=\"language-go\" data-lang=\"go\"><span style=\"color:#f92672\">\/<\/span><span style=\"color:#a6e22e\">scripts<\/span><span style=\"color:#f92672\">\/<\/span><span style=\"color:#a6e22e\">upcp<\/span>\n<span style=\"color:#f92672\">\/<\/span><span style=\"color:#a6e22e\">scripts<\/span><span style=\"color:#f92672\">\/<\/span><span style=\"color:#a6e22e\">check_cpanel_rpms<\/span> <span style=\"color:#f92672\">--<\/span><span style=\"color:#a6e22e\">fix<\/span> <span style=\"color:#f92672\">--<\/span><span style=\"color:#a6e22e\">long<\/span><span style=\"color:#f92672\">-<\/span><span style=\"color:#a6e22e\">list<\/span><\/code><\/pre>\n<\/td>\n<\/tr>\n<\/table>\n<\/div>\n<\/div>\n<p>Verify the new Exim RPM was installed: <\/p>\n<div class=\"highlight\">\n<pre style=\"color:#f8f8f2;background-color:#272822;-moz-tab-size:4;-o-tab-size:4;tab-size:4\"><code class=\"language-perl\" data-lang=\"perl\">rpm <span style=\"color:#f92672\">-<\/span><span style=\"color:#e6db74\">q --changelog <\/span>exim <span style=\"color:#f92672\">|<\/span> grep CVE<span style=\"color:#f92672\">-<\/span><span style=\"color:#ae81ff\">2017<\/span><span style=\"color:#f92672\">-<\/span><span style=\"color:#ae81ff\">16943<\/span><\/code><\/pre>\n<\/div>\n<p>The output should resemble below: <\/p>\n<div class=\"highlight\">\n<pre style=\"color:#f8f8f2;background-color:#272822;-moz-tab-size:4;-o-tab-size:4;tab-size:4\"><code class=\"language-perl\" data-lang=\"perl\"><span style=\"color:#f92672\">-<\/span> Applied patch <span style=\"color:#66d9ef\">for<\/span> CVE<span style=\"color:#f92672\">-<\/span><span style=\"color:#ae81ff\">2017<\/span><span style=\"color:#f92672\">-<\/span><span style=\"color:#ae81ff\">16943<\/span> <span style=\"color:#f92672\">and<\/span> CVE<span style=\"color:#f92672\">-<\/span><span style=\"color:#ae81ff\">2017<\/span><span style=\"color:#f92672\">-<\/span><span style=\"color:#ae81ff\">16944<\/span><\/code><\/pre>\n<\/div>\n<h2 id=\"workarounds\">Workarounds<\/h2>\n<p>As stated above: you may completely disable chunking support in Exim. To do this, run the following command as root via SSH: <\/p>\n<div class=\"highlight\">\n<pre style=\"color:#f8f8f2;background-color:#272822;-moz-tab-size:4;-o-tab-size:4;tab-size:4\"><code class=\"language-perl\" data-lang=\"perl\"><span style=\"color:#e6db74\">\/scripts\/<\/span>autorepair exim_disable_chunking<\/code><\/pre>\n<\/div>\n<h2 id=\"additional-information\">Additional Information<\/h2>\n<ul>\n<li>\n<p>https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2017-16943<\/p>\n<\/li>\n<li>\n<p>https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2017-16944<\/p>\n<\/li>\n<li>\n<p>https:\/\/lists.exim.org\/lurker\/message\/20171125.034842.d1d75cac.en.html<\/p>\n<\/li>\n<\/ul>\n<p>If you are still experiencing issues or need additional help, contact cPanel support.<\/p>\n<\/p><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Background Information On Friday, November 24 2017, Exim announced two vulnerabilities in versions 4.88 and later. Impact According to Exim development: \u201cA remote code execution vulnerability has been reported in Exim, with immediate public disclosure (we were given no private notice).\u201d The vulnerability exists in the ESMTP CHUNKING extension, and an additional DoS vulnerability exists &hellip;<\/p>\n","protected":false},"author":1,"featured_media":774,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[1],"tags":[],"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/ssdsunucum.com\/blog\/wp-json\/wp\/v2\/posts\/773"}],"collection":[{"href":"https:\/\/ssdsunucum.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ssdsunucum.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ssdsunucum.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ssdsunucum.com\/blog\/wp-json\/wp\/v2\/comments?post=773"}],"version-history":[{"count":0,"href":"https:\/\/ssdsunucum.com\/blog\/wp-json\/wp\/v2\/posts\/773\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ssdsunucum.com\/blog\/wp-json\/wp\/v2\/media\/774"}],"wp:attachment":[{"href":"https:\/\/ssdsunucum.com\/blog\/wp-json\/wp\/v2\/media?parent=773"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ssdsunucum.com\/blog\/wp-json\/wp\/v2\/categories?post=773"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ssdsunucum.com\/blog\/wp-json\/wp\/v2\/tags?post=773"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}