{"id":12884,"date":"2019-07-11T20:24:26","date_gmt":"2019-07-11T20:24:26","guid":{"rendered":"http:\/\/news.cpanel.com\/?p=57159"},"modified":"2019-07-11T20:24:26","modified_gmt":"2019-07-11T20:24:26","slug":"urgent-updates-for-70-76-and-78-and-exim-cve-2019-10149","status":"publish","type":"post","link":"https:\/\/afaghhosting.net\/blog\/urgent-updates-for-70-76-and-78-and-exim-cve-2019-10149\/","title":{"rendered":"Urgent Updates for 70, 76, and 78 and Exim CVE-2019-10149"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/news.cpanel.com\/wp-content\/uploads\/2017\/01\/og-cPnews-1.jpg\" class=\"ff-og-image-inserted\" alt=\"\" title=\"\"><\/div>\n<p>In a post on the&nbsp;<a href=\"https:\/\/blog.cpanel.com\/exim-cve-2019-10149-protect-yourself\/?utm_source=news_site&amp;utm_medium=referral&amp;utm_campaign=exim-cve-2019-10149\" target=\"_blank\" rel=\"noopener\">cPanel Blog last night<\/a>&nbsp;we shared information regarding an exploit that had been identified in Exim. This exploit allows attackers to execute code as the root user on your server without authentication and was&nbsp;<a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2019-10149\" target=\"_blank\" rel=\"noopener\">rated a 9.8 out of 10 in severity<\/a>.<\/p>\n<p>While Version 80 was never vulnerable to this exploit, and we released a patch for Version 78 last night, the recently End of Life&nbsp;<a href=\"https:\/\/news.cpanel.com\/cpanel-whm-version-70-now-eol\/\" target=\"_blank\" rel=\"noopener\">Version 70<\/a>&nbsp;and&nbsp;<a href=\"https:\/\/news.cpanel.com\/reminder-cpanel-whm-version-76-now-eol\/\" target=\"_blank\" rel=\"noopener\">Version 76<\/a>&nbsp;remained vulnerable. More details were released today, including details on exactly how to gain root access to a remote server.&nbsp;<\/p>\n<p>It\u2019s possible that the update will be blocked with an error similar to this:<\/p>\n<pre class=\"wp-block-preformatted\">A system upgrade was not possible due to the following blockers:<br>[2019-06-07 02:02:51 +0200] W [FATAL] - You must migrate from EA3 to EA4 before upgrading to v78 or newer. You can do so by running \/usr\/local\/cpanel\/scripts\/migrate_ea3_to_ea4 or via WHM\u2019s EasyApache 4 Migration interface. For more information please see: https:\/\/go.cpanel.net\/EA4Migration<\/pre>\n<p>If you encounter this error, you must manually adjust your \/etc\/cpupdate.conf file to the example below:<\/p>\n<pre class=\"wp-block-preformatted\">CPANEL=11.76\nRPMUP=daily\nSARULESUP=daily\nSTAGING_DIR=\/usr\/local\/cpanel\nUPDATES=daily<\/pre>\n<p>Once you have completed this update (upcp) please set this back to the following:<\/p>\n<pre class=\"wp-block-preformatted\">CPANEL=release\nRPMUP=daily\nSARULESUP=daily\nSTAGING_DIR=\/usr\/local\/cpanel\nUPDATES=daily<\/pre>\n<p>This will allow you to upgrade to newer versions of cPanel &amp; WHM once you have migrated to EasyApache 4.<\/p>\n<p>While Exim is open source software that we bundle with our software and is not built by cPanel, this vulnerability is something that we feel deserves our attention.&nbsp;This is an extremely rare and specific situation that has the potential to impact everyone who interacts with the internet in any way. For that reason, we have released an update to patch this vulnerability for both Version 70 and Version 76.<\/p>\n<p>To ensure that your server has received the patch, please update to one of the following versions:<\/p>\n<table class=\"wp-block-table\">\n<thead>\n<tr>\n<th>TIER<\/th>\n<th>VERSION<\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td>70<\/td>\n<td>70.0.69<\/td>\n<\/tr>\n<tr>\n<td>76<\/td>\n<td>76.0.22<\/td>\n<\/tr>\n<tr>\n<td>78<\/td>\n<td>78.0.27<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>cPanel &amp; WHM Versions 70 and 76 remain End of Life and will receive no other updates. This is a one-time bending of our policy, and we do not plan to pursue any other updates for these versions. We still strongly recommend that you keep your servers updated, and continue to run the most recent versions of cPanel &amp; WHM available.&nbsp;<\/p>\n<p>If you need help with any of this, don\u2019t hesitate to reach out! The best places to ask questions are the&nbsp;<a href=\"https:\/\/go.cpanel.net\/CVE201910149\" target=\"_blank\" rel=\"noopener\">cPanel Forums<\/a>,&nbsp;our directly to our&nbsp;<a href=\"https:\/\/tickets.cpanel.net\/\" target=\"_blank\" rel=\"noopener\">support team<\/a>. You can also join us in our&nbsp;<a href=\"https:\/\/go.cpanel.net\/slack\" target=\"_blank\" rel=\"noopener\">Slack<\/a>&nbsp;or&nbsp;<a href=\"https:\/\/go.cpanel.net\/discord\" target=\"_blank\" rel=\"noopener\">Discord<\/a>&nbsp;channels, or even ask on our&nbsp;<a href=\"https:\/\/reddit.com\/r\/cpanel\" target=\"_blank\" rel=\"noopener\">subreddit<\/a>!&nbsp;<\/p>\n<p> \u0645\u062f\u06cc\u0631\u06cc\u062a \u0633\u0631\u0648\u0631 \u067e\u0634\u062a\u06cc\u0628\u0627\u0646\u06cc \u0648 \u0645\u0634\u0627\u0648\u0631\u0647 &#8211; \u062b\u0628\u062a \u062f\u0627\u0645\u0646\u0647<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In a post on the&nbsp;cPanel Blog last night&nbsp;we shared information regarding an exploit that had been identified in Exim. This exploit allows attackers to execute code as the root user on your server without authentication and was&nbsp;rated a 9.8 out of 10 in severity. While Version 80 was never vulnerable to this exploit, and we &hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[25],"tags":[],"class_list":["post-12884","post","type-post","status-publish","format-standard","hentry","category-cpanel-news"],"_links":{"self":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/posts\/12884","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/comments?post=12884"}],"version-history":[{"count":0,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/posts\/12884\/revisions"}],"wp:attachment":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/media?parent=12884"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/categories?post=12884"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/tags?post=12884"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}