On Thursday, September 26, 2019, the Exim maintainers received a bug report about a heap overflow in Exim.
On Friday, September 27, 2019, the Exim maintainers released a patch.
We will continue to update this page as more information becomes available.
From the Exim Developers:
There is a heap-based buffer overflow in string_vformat (string.c).
The currently known exploit uses a extraordinary long EHLO string to
crash the Exim process that is receiving the message. While at this
mode of operation Exim already dropped its privileges, other paths to
reach the vulnerable code may exist.
The following versions of cPanel & WHM were patched to have the correct version of Exim.
All previous versions of cPanel & WHM below the stated versions are potentially vulnerable.
How to determine if your server is up to date
The updated RPMs provided by cPanel should be at least 4.92-4 on version 82 as well as the EDGE tier, and 4.92-6 on LTS version 78.
Expected response on version 82 and the EDGE tier:
Expected response on LTS version 78:
What to do if you are not up to date.
If your server is not running one of the above versions, update immediately.
To upgrade your server, use WHM's interface (WHM >> Home >> cPanel >> Upgrade to Latest Version).
Alternatively, you can run the commands below to upgrade your server from the command line:
Verify the new Exim RPM was installed:
Run the following:
The output on version 82 and the EDGE tier should resemble below:
The output on LTS version 78 should resemble below:
Run the following to ensure the CVE is in the changelog:
The output on LTS version 78, version 82, and the EDGE tier should resemble below:
More detailed information can be found at the following websites: