{"id":52755,"date":"2019-06-06T18:19:55","date_gmt":"2019-06-06T23:19:55","guid":{"rendered":"https:\/\/blog.cpanel.com\/?p=52755"},"modified":"2019-06-06T18:19:55","modified_gmt":"2019-06-06T23:19:55","slug":"exim-cve-2019-10149-protect-yourself","status":"publish","type":"post","link":"https:\/\/devel.www.cpanel.net\/blog\/products\/exim-cve-2019-10149-protect-yourself\/","title":{"rendered":"Exim CVE-2019-10149: how to protect yourself"},"content":{"rendered":"\n
Exim is the mail server software cPanel & WHM servers use. Last week an exploit for Exim was identified, and today a patch for the exploit was released. This exploit allowed for both local and remote root-level privilege escalation. That means that you won’t need to be able to access the server as a user to exploit the server, as is the case with most security vulnerabilities that are found. <\/p>\n\n\n\n
It’s possible that the update will be blocked with an error similar to this:<\/p>\n\n\n\n
A system upgrade was not possible due to the following blockers:
\n[2019-06-07 02:02:51 +0200] W [FATAL] - You must migrate from EA3 to EA4 before upgrading to v78 or newer. You can do so by running \/usr\/local\/cpanel\/scripts\/migrate_ea3_to_ea4 or via WHM\u2019s EasyApache 4 Migration interface. For more information please see: https:\/\/go.cpanel.net\/EA4Migration<\/pre>\n\n\n\nIf you encounter this error, you must manually adjust your \/etc\/cpupdate.conf file to the example below:<\/p>\n\n\n\n
CPANEL=11.76\nRPMUP=daily\nSARULESUP=daily\nSTAGING_DIR=\/usr\/local\/cpanel\nUPDATES=daily<\/pre>\n\n\n\nOnce you have completed this update (upcp) please set this back to the following:<\/p>\n\n\n\n
CPANEL=release\nRPMUP=daily\nSARULESUP=daily\nSTAGING_DIR=\/usr\/local\/cpanel\nUPDATES=daily<\/pre>\n\n\n\nThis will allow you to upgrade to newer versions of cPanel & WHM once you have migrated to EasyApache 4.<\/p>\n\n\n\n
While Exim is open source software that we bundle with our software and is not built by cPanel, this vulnerability is something that we feel deserves our attention. This is an extremely rare and specific situation that has the potential to impact everyone who interacts with the internet in any way. For that reason, we have released an update to patch this vulnerability for both Version 70 and Version 76. To ensure that your server has received the patch, please update to one of the following versions:<\/p>\n\n\n\n