On Wednesday 4th September 2019, Exim maintainers announced that they had received a report of a potential remote exploit in Exim, in versions up to and including 4.92.2.
CVE-2019-15846 is the new unauthenticated remote code execution vulnerability in the Exim message transfer agent. It allows remote attackers to execute arbitrary code as root via a trailing backslash.
This vulnerability has been patched in version 4.92.2 and all users have been urged to update immediately.
First, check what version of WHM/cPanel you’re running via SSH: /usr/local/cpanel/cpanel -V
Then check what version of Exim you have installed via SSH: rpm -q exim
You should get the following patched responses:
If the resulting responses identify that your version is (or is older than) 4.92.2, then your version of Exim may be vulnerable. You can then confirm this by running: rpm -q –changelog exim | grep CVE-2019-15846
If you’ve confirmed that the version you are running is vulnerable, update the Exim version in cPanel as follows:
You should get an output similar to: Applied upstream patch for CVE-2019-15846
If you are using Exim but not with cPanel or WHM, update using your OS software package updater.
For any further information on CVE-2019-15846, you can view cPanel’s supporting documentation here.
The UKFast team is more than happy to help answer any questions you may have about your security or carrying out the above updates. Please don’t hesitate to contact the UKFast support team on 0800 923 0605.