Categories: CVE/vulnerability

Vulnerability in Exim Mail Server Let Hackers Gain Root Access Remotely From 5 Million Email Servers

A Vulnerability resides in the Exim mail server allows both local and remote attacker to execute the arbitrary code and exploit the system to gain root access.

Exim is a mail transfer agent (MTA) developed by the University of Cambridge as an open-source project and is responsible for receiving, routing and delivering e-mail messages used on Unix-like operating systems. 

Last June, RCE Vulnerability in Millions of Exim Email Server, allowed attackers to Execute Arbitrary Command & Control the Server Remotely

Exit server that accepts the TLS connections are vulnerable to execute the malicious code remotely by an attacker, and it does not depend on the TLS library, so both GnuTLS and OpenSSL are vulnerable.

In order to exploit the vulnerability, the attacker sending a SNI ending in a backslash-null sequence during the initial TLS handshake.

The remote code execution vulnerability affected all Exim mail server versions up to 4.92.1, and the vulnerability has been fixed in the new version 4.92.2.

Qualys analyzed the vulnerability and released a PoC exploit code, also the vulnerability can be tracked as CVE-2019-15846 .

Based on Shodan report, more than 5 Million Exim server is running across the internet and many of them are still unpatched.

Since the vulnerability has been patched and releases the new version, the server administrator is recommended to apply the patch immediately before cybercriminals exploit the Exim server.

You can download and build a fixed version here and GitHub.

Also read about Penetration Testing Mail Server with Email Spoofing – Exploiting Open Relay configured Public Mail Servers.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and Hacking News update

Balaji

BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Recent Posts

iPhone Sharing the Photos by Default to Apple

A recent blog post by developer Jeff Johnson has brought to light a new feature…

49 minutes ago

Stealthy Steganography Backdoor Attacks Target Android Apps

BARWM, a novel backdoor attack approach for real-world deep learning (DL) models deployed on mobile…

1 hour ago

The Defender vs. The Attacker Game

The researcher proposes a game-theoretic approach to analyze the interaction between the model defender and…

2 hours ago

Weaponized Python Scripts Deliver New SwaetRAT Malware

The Python script leverages low-level interactions with the Windows operating system, which imports crucial libraries…

2 hours ago

Windows 11 BitLocker Bypassed to Extract Encryption Keys

An attacker with physical access can abruptly restart the device and dump RAM, as analysis…

3 hours ago

Malicious npm Packages Stealing Developers’ Sensitive Data

Attackers published 20 malicious npm packages impersonating legitimate Nomic Foundation and Hardhat plugins, where these…

3 hours ago