Click on the icon above to edit the status of the investigation.  By default, the status should read 'In Progress' and be marked red. If cPanel has come to a resolution and will not be actively updating this issue anymore, this status should read 'Resolved' and be marked green. Documentation will provide a final review of the page once it is no longer actively updated and mark these 'green' once completed.

 PLEASE SPELL CHECK YOUR ARTICLES!! :) 


Background Information

On Monday, June 19, 2017, Qualsys announced memory handling vulnerabilities in a number of software distributions, including a vulnerability that could leverage a bug in the Exim software to achieve a local privilege escalation to root. 

 


 

Impact

Vulnerable versions of Exim can be susceptible to local privilege escalation to root.

 

Releases

TIERVERSION
6464.0.30
6262.0.25
CURRENT64.0.30
RELEASE64.0.30
STABLE64.0.30

 

How to determine if your server is up to date

The updated RPMs provided by cPanel will contain a changelog entry with the CVE number. You can check for this changelog entry with the following command:

rpm -q --changelog exim | grep CVE-2017-1000369

The output should resemble below:

- Applied patch for CVE-2017-1000369


What to do if you are not up to date.

If your server is not running one of the above versions, update immediately. 

To upgrade your server, use WHM's Upgrade to Latest Version interface (WHM >> Home >> cPanel >> Upgrade to Latest Version).

Alternatively, you can run the below commands to upgrade your server from the command line:

/scripts/upcp
/scripts/check_cpanel_rpms --fix --long-list

Verify the new Exim RPM was installed:

rpm -q --changelog exim | grep CVE-2017-1000369

The output should resemble below:

- Applied patch for CVE-2017-1000369

 

Additional documentation