{"id":790,"date":"2021-07-23T12:38:16","date_gmt":"2021-07-23T12:38:16","guid":{"rendered":"https:\/\/ssdsunucum.com\/blog\/cve-2016-9963-exim\/"},"modified":"2021-07-23T12:38:16","modified_gmt":"2021-07-23T12:38:16","slug":"cve-2016-9963-exim","status":"publish","type":"post","link":"https:\/\/ssdsunucum.com\/blog\/cve-2016-9963-exim\/","title":{"rendered":"CVE-2016-9963 Exim"},"content":{"rendered":"<\/p>\n<div class=\"col-md-9\">\n<div class=\"flex-column flex-md-row article-header\"><\/div>\n<hr>\n<h2 id=\"background-information\">Background Information<\/h2>\n<p>On Sunday, December 25, 2016, Exim announced a vulnerability in versions 4.69 to 4.87 of the Exim software.<\/p>\n<h2 id=\"impact\">Impact<\/h2>\n<p>According to Exim development:<\/p>\n<blockquote>\n<p>\u201cIf several conditions are met, Exim leaks private information to a remote attacker.\u201d<\/p>\n<\/blockquote>\n<p>Depending on configuration options for Exim, a domain\u2019s DKIM signing keys can be leaked to Exim log files. Additionally, if the <code>EXPERIMENTAL_DSN_INFO=yes<\/code> build flag is used, DKIM signing keys can be leaked to a remote attacker.<\/p>\n<p>Exim log files are normally not readable by unprivileged users on cPanel &#038; WHM systems. Additionally, cPanel &#038; WHM does <strong>not<\/strong> provide an Exim installation with the <code>EXPERIMENTAL_DSN_INFO=yes<\/code> build flag and does not leak DKIM signing keys to remote attackers based on currently available information. As such, the most severe impacts of CVE-2016-9963 do not apply to cPanel &#038; WHM systems.<\/p>\n<h2 id=\"releases\">Releases<\/h2>\n<p>The following versions of cPanel &#038; WHM were patched to have the correct version of Exim.<\/p>\n<ul>\n<li>\n<p>62 \u2014 62.0.1<\/p>\n<\/li>\n<li>\n<p>60 \u2014 60.0.31<\/p>\n<\/li>\n<li>\n<p>58 \u2014 58.0.41<\/p>\n<\/li>\n<li>\n<p>56 \u2014 56.0.41<\/p>\n<\/li>\n<li>\n<p>54 \u2014 54.0.34<\/p>\n<\/li>\n<li>\n<p>EDGE \u2014 62.0.1<\/p>\n<\/li>\n<li>\n<p>CURRENT \u2014 62.0.1<\/p>\n<\/li>\n<li>\n<p>RELEASE \u2014 60.0.31<\/p>\n<\/li>\n<li>\n<p>STABLE \u2014 60.0.31<\/p>\n<\/li>\n<\/ul>\n<h2 id=\"how-to-determine-if-your-server-is-up-to-date\">How to determine if your server is up to date<\/h2>\n<p>The updated RPMs provided by cPanel will contain a changelog entry with the CVE number. You can check for this changelog entry with the following command: <\/p>\n<div class=\"highlight\">\n<pre style=\"color:#f8f8f2;background-color:#272822;-moz-tab-size:4;-o-tab-size:4;tab-size:4\"><code class=\"language-perl\" data-lang=\"perl\">rpm <span style=\"color:#f92672\">-<\/span><span style=\"color:#e6db74\">q --changelog <\/span>exim <span style=\"color:#f92672\">|<\/span> grep CVE<span style=\"color:#f92672\">-<\/span><span style=\"color:#ae81ff\">2016<\/span><span style=\"color:#f92672\">-<\/span><span style=\"color:#ae81ff\">9963<\/span><\/code><\/pre>\n<\/div>\n<p>The output should resemble below: <\/p>\n<div class=\"highlight\">\n<pre style=\"color:#f8f8f2;background-color:#272822;-moz-tab-size:4;-o-tab-size:4;tab-size:4\"><code class=\"language-perl\" data-lang=\"perl\"><span style=\"color:#f92672\">-<\/span> Patch <span style=\"color:#66d9ef\">for<\/span> CVE<span style=\"color:#f92672\">-<\/span><span style=\"color:#ae81ff\">2016<\/span><span style=\"color:#f92672\">-<\/span><span style=\"color:#ae81ff\">9963<\/span><\/code><\/pre>\n<\/div>\n<h2 id=\"what-to-do-if-you-are-not-up-to-date\">What to do if you are not up to date<\/h2>\n<p>If your server is <strong>not<\/strong> running one of the above versions, update immediately.<\/p>\n<p>To upgrade your server, use WHM\u2019s <em>Upgrade to Latest Version<\/em> interface (<em>WHM &gt;&gt; Home &gt;&gt; cPanel &gt;&gt; Upgrade to Latest Version<\/em>).<\/p>\n<p>Alternatively, you can run the below commands to upgrade your server from the command line: <\/p>\n<div class=\"highlight\">\n<div style=\"color:#f8f8f2;background-color:#272822;-moz-tab-size:4;-o-tab-size:4;tab-size:4\">\n<table style=\"border-spacing:0;padding:0;margin:0;border:0;width:auto;overflow:auto;display:block;\">\n<tr>\n<td style=\"vertical-align:top;padding:0;margin:0;border:0;\">\n<pre style=\"color:#f8f8f2;background-color:#272822;-moz-tab-size:4;-o-tab-size:4;tab-size:4\"><code class=\"language-go\" data-lang=\"go\"><span style=\"margin-right:0.4em;padding:0 0.4em 0 0.4em;color:#7f7f7f\">1\n<\/span><span style=\"margin-right:0.4em;padding:0 0.4em 0 0.4em;color:#7f7f7f\">2\n<\/span><\/code><\/pre>\n<\/td>\n<td style=\"vertical-align:top;padding:0;margin:0;border:0;;width:100%\">\n<pre style=\"color:#f8f8f2;background-color:#272822;-moz-tab-size:4;-o-tab-size:4;tab-size:4\"><code class=\"language-go\" data-lang=\"go\"><span style=\"color:#f92672\">\/<\/span><span style=\"color:#a6e22e\">scripts<\/span><span style=\"color:#f92672\">\/<\/span><span style=\"color:#a6e22e\">upcp<\/span>\n<span style=\"color:#f92672\">\/<\/span><span style=\"color:#a6e22e\">scripts<\/span><span style=\"color:#f92672\">\/<\/span><span style=\"color:#a6e22e\">check_cpanel_rpms<\/span> <span style=\"color:#f92672\">--<\/span><span style=\"color:#a6e22e\">fix<\/span> <span style=\"color:#f92672\">--<\/span><span style=\"color:#a6e22e\">long<\/span><span style=\"color:#f92672\">-<\/span><span style=\"color:#a6e22e\">list<\/span><\/code><\/pre>\n<\/td>\n<\/tr>\n<\/table>\n<\/div>\n<\/div>\n<p>Verify the new Exim RPM was installed: <\/p>\n<div class=\"highlight\">\n<pre style=\"color:#f8f8f2;background-color:#272822;-moz-tab-size:4;-o-tab-size:4;tab-size:4\"><code class=\"language-perl\" data-lang=\"perl\">rpm <span style=\"color:#f92672\">-<\/span><span style=\"color:#e6db74\">q --changelog <\/span>exim <span style=\"color:#f92672\">|<\/span> grep CVE<span style=\"color:#f92672\">-<\/span><span style=\"color:#ae81ff\">2016<\/span><span style=\"color:#f92672\">-<\/span><span style=\"color:#ae81ff\">9963<\/span><\/code><\/pre>\n<\/div>\n<p>The output should resemble below: <\/p>\n<div class=\"highlight\">\n<pre style=\"color:#f8f8f2;background-color:#272822;-moz-tab-size:4;-o-tab-size:4;tab-size:4\"><code class=\"language-perl\" data-lang=\"perl\"><span style=\"color:#f92672\">-<\/span> Patch <span style=\"color:#66d9ef\">for<\/span> CVE<span style=\"color:#f92672\">-<\/span><span style=\"color:#ae81ff\">2016<\/span><span style=\"color:#f92672\">-<\/span><span style=\"color:#ae81ff\">9963<\/span><\/code><\/pre>\n<\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Background Information On Sunday, December 25, 2016, Exim announced a vulnerability in versions 4.69 to 4.87 of the Exim software. Impact According to Exim development: \u201cIf several conditions are met, Exim leaks private information to a remote attacker.\u201d Depending on configuration options for Exim, a domain\u2019s DKIM signing keys can be leaked to Exim log &hellip;<\/p>\n","protected":false},"author":1,"featured_media":791,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[1],"tags":[],"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/ssdsunucum.com\/blog\/wp-json\/wp\/v2\/posts\/790"}],"collection":[{"href":"https:\/\/ssdsunucum.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ssdsunucum.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ssdsunucum.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ssdsunucum.com\/blog\/wp-json\/wp\/v2\/comments?post=790"}],"version-history":[{"count":0,"href":"https:\/\/ssdsunucum.com\/blog\/wp-json\/wp\/v2\/posts\/790\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ssdsunucum.com\/blog\/wp-json\/wp\/v2\/media\/791"}],"wp:attachment":[{"href":"https:\/\/ssdsunucum.com\/blog\/wp-json\/wp\/v2\/media?parent=790"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ssdsunucum.com\/blog\/wp-json\/wp\/v2\/categories?post=790"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ssdsunucum.com\/blog\/wp-json\/wp\/v2\/tags?post=790"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}