<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for exim</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2017:1625-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2017-06-20T07:13:45Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2017-06-20T07:13:45Z</InitialReleaseDate>
    <CurrentReleaseDate>2017-06-20T07:13:45Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for exim</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for exim fixes the following issues:

- CVE-2017-1000369: Fixed a memory leak in exim commandline
  handling, which could be used to exhaust memory and make 'stack crash'
  attacks likely. (boo#1044692)
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00020.html</URL>
      <Description>E-Mail link for openSUSE-SU-2017:1625-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Leap 42.2">
      <Branch Type="Product Name" Name="openSUSE Leap 42.2">
        <FullProductName ProductID="openSUSE Leap 42.2">openSUSE Leap 42.2</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="exim-4.86.2-10.3.1">
      <FullProductName ProductID="exim-4.86.2-10.3.1">exim-4.86.2-10.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="eximon-4.86.2-10.3.1">
      <FullProductName ProductID="eximon-4.86.2-10.3.1">eximon-4.86.2-10.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="eximstats-html-4.86.2-10.3.1">
      <FullProductName ProductID="eximstats-html-4.86.2-10.3.1">eximstats-html-4.86.2-10.3.1</FullProductName>
    </Branch>
    <Relationship ProductReference="exim-4.86.2-10.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:exim-4.86.2-10.3.1">exim-4.86.2-10.3.1 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="eximon-4.86.2-10.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:eximon-4.86.2-10.3.1">eximon-4.86.2-10.3.1 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="eximstats-html-4.86.2-10.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:eximstats-html-4.86.2-10.3.1">eximstats-html-4.86.2-10.3.1 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Exim supports the use of multiple "-p" command line arguments which are malloc()'ed and never free()'ed, used in conjunction with other issues allows attackers to cause arbitrary code execution. This affects exim version 4.89 and earlier. Please note that at this time upstream has released a patch (commit 65e061b76867a9ea7aeeb535341b790b90ae6c21), but it is not known if a new point release is available that addresses this issue at this time.</Note>
    </Notes>
    <CVE>CVE-2017-1000369</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:exim-4.86.2-10.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:eximon-4.86.2-10.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:eximstats-html-4.86.2-10.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00020.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-1000369.html</URL>
        <Description>CVE-2017-1000369</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1037551</URL>
        <Description>SUSE Bug 1037551</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1044692</URL>
        <Description>SUSE Bug 1044692</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
