6 June 2019

New RCE-flaw in Exim impacts almost 60% of email servers worldwide


New RCE-flaw in Exim impacts almost 60% of email servers worldwide

Yesterday we have publish a security bulletin SB2019060505 describing remote code execution vulnerability in Exim MTA. According to the recent survey, Exim is used by 57% (507,389) of all mail servers worldwide.

The flaw affects Exim installations running versions 4.87 to 4.91 and allows local and remote attackers to execute arbitrary commands with execv() call. The major concern in here is that the code will be executed with root privileges.

The vulnerability can be exploited instantly by a local attacker with the access (even having low level account) to an email server. Remote exploitation of this bug requires an attacker to maintain a connection to the vulnerable server for 7 days (by transmitting one byte every few minutes).

It is recommended to install the latest version Exim 4.92 ASAP.

Back to the list

Latest Posts

Apple fixed four dangerous vulnerabilities in macOS

Apple fixed four dangerous vulnerabilities in macOS

Exploitation of some of the problems allows arbitrary code execution on the system.
28 September 2020
200,000 Businesses are exposed to MitM attacks

200,000 Businesses are exposed to MitM attacks

A successful attack could allow an attacker to present a valid SSL certificate and fraudulently take over a connection.
25 September 2020
Hackers exploit Zerologon vulnerability in wild

Hackers exploit Zerologon vulnerability in wild

Microsoft strongly recommends all Windows administrators to install the security updates.
24 September 2020
Featured vulnerabilities
Denial of service in Apache Openmeetings
Medium Patched | 28 Sep, 2020
Cross-site scripting in Arachnys Cabot
Low Not Patched | 28 Sep, 2020
Information disclosure in PowerDNS
Medium Patched | 28 Sep, 2020
Plesk Onyx update for Horde
Medium Patched | 28 Sep, 2020