Article Details
Scrape Timestamp (UTC): 2024-07-12 10:57:45.780
Source: https://thehackernews.com/2024/07/critical-exim-mail-server-vulnerability.html
Original Article Text
Click to Toggle View
Critical Exim Mail Server Vulnerability Exposes Millions to Malicious Attachments. A critical security issue has been disclosed in the Exim mail transfer agent that could enable threat actors to deliver malicious attachments to target users' inboxes. The vulnerability, tracked as CVE-2024-39929, has a CVSS score of 9.1 out of 10.0. It has been addressed in version 4.98. "Exim through 4.97.1 misparses a multiline RFC 2231 header filename, and thus remote attackers can bypass a $mime_filename extension-blocking protection mechanism, and potentially deliver executable attachments to the mailboxes of end users," according to a description shared on the U.S. National Vulnerability Database (NVD). Exim is a free, mail transfer agent that's used in hosts that are running Unix or Unix-like operating systems. It was first released in 1995 for use at the University of Cambridge. Attack surface management firm Censys said 4,830,719 of the 6,540,044 public-facing SMTP mail servers are running Exim. As of July 12, 2024, 1,563,085 internet-accessible Exim servers are running a potentially vulnerable version (4.97.1 or earlier). A majority of the vulnerable instances are located in the U.S., Russia, and Canada. "The vulnerability could allow a remote attacker to bypass filename extension blocking protection measures and deliver executable attachments directly to end-users' mailboxes," it noted. "If a user were to download or run one of these malicious files, the system could be compromised." This also means that prospective targets must click on an attached executable for the attack to be successful. While there are no reports of active exploitation of the flaw, it's essential that users move quickly to apply the patches to mitigate potential threats. The development comes almost a year after the project maintainers a set of six vulnerabilities in Exim that could result in information disclosure and remote code execution.
Daily Brief Summary
A significant vulnerability identified in Exim mail servers potentially exposes millions to malicious email attachments.
Designated as CVE-2024-39929, this flaw has a critical severity rating of 9.1 and affects versions up to 4.97.1.
The susceptibility stems from improper parsing of RFC 2231 multiline headers, allowing attackers to circumvent MIME filename extension filters.
Over 4.83 million of approximately 6.54 million internet-accessible SMTP servers operate using the vulnerable Exim versions.
The most impacted regions include the U.S., Russia, and Canada, with many servers still unpatched as of the latest reports.
Successful exploitation requires a user to download and execute the malicious attachment, posing significant risks of system compromise.
No active exploits have been reported yet; however, immediate update to version 4.98 is advised to mitigate this risk.
The discovery follows a previous set of vulnerabilities found nearly a year ago, emphasizing continual security challenges for Exim.