CVE-2019-16928: a new vulnerability on Exim exposes millions of email servers to remote attacks

Another potential RCE in Exim! Let’s update, folks!

Jeremy Harris, from Exim Development Team, has discovered a heap-based buffer overflow issue in all versions of Exim servers up to and including 4.92.1.

The vulnerability (CVE-2019-16928) could allow remote attackers to cause a denial of service or execute arbitrary code on a targeted Exim mail server using a specially crafted line in the EHLO command with the rights of the targeted user: currently the public PoC exploit for this vulnerability allows only crash the Exim process by sending a long string in the EHLO command, though other commands could also be used to potentially execute arbitrary code.

Is there a patch?

Yep! Exim maintainers released an urgent security update after publishing the early warning, giving system administrators an early head-up on its upcoming security patches:

Fix
===

Download and build the fixed version 4.92.3

    Tarballs: https://ftp.exim.org/pub/exim/exim4/
    Git:      https://github.com/Exim/exim.git
              - tag    exim-4.92.3
              - branch exim-4.92.3+fixes

The tagged commit is the officially released version. The +fixes branch
isn't officially maintained, but contains the security fix *and* useful
fixes.

If you can't install the above versions, ask your package maintainer for
a version containing the backported fix. On request and depending on our
resources we will support you in backporting the fix.

References


Related posts

Comments

This site uses Akismet to reduce spam. Learn how your comment data is processed.