• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
new critical security flaws expose exim mail servers to remote

New Critical Security Flaws Expose Exim Mail Servers to Remote Attacks

You are here: Home / General Cyber Security News / New Critical Security Flaws Expose Exim Mail Servers to Remote Attacks
September 30, 2023

A number of security vulnerabilities have been disclosed in the Exim mail transfer agent that, if properly exploited, could result in details disclosure and distant code execution.

The list of flaws, which had been noted anonymously way again in June 2022, is as follows –

  • CVE-2023-42114 (CVSS score: 3.7) – Exim NTLM Challenge Out-Of-Bounds Examine Data Disclosure Vulnerability
  • CVE-2023-42115 (CVSS rating: 9.8) – Exim AUTH Out-Of-Bounds Publish Remote Code Execution Vulnerability
  • CVE-2023-42116 (CVSS score: 8.1) – Exim SMTP Challenge Stack-based Buffer Overflow Distant Code Execution Vulnerability
  • CVE-2023-42117 (CVSS score: 8.1) – Exim Incorrect Neutralization of Distinctive Things Remote Code Execution Vulnerability
  • CVE-2023-42118 (CVSS score: 7.5) – Exim libspf2 Integer Underflow Distant Code Execution Vulnerability
  • CVE-2023-42119 (CVSS score: 3.1) – Exim dnsdb Out-Of-Bounds Browse Information and facts Disclosure Vulnerability

The most severe of the vulnerabilities is CVE-2023-42115, which permits remote, unauthenticated attackers to execute arbitrary code on influenced installations of Exim.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


Cybersecurity

“The specific flaw exists in the SMTP services, which listens on TCP port 25 by default,” the Zero Day Initiative stated in an warn released this week.

“The issue outcomes from the deficiency of appropriate validation of user-provided details, which can final result in a produce earlier the end of a buffer. An attacker can leverage this vulnerability to execute code in the context of the provider account.”

Exim maintainers, in a message shared on the Open up Source Security mailing listing oss-security, explained fixes for CVE-2023-42114, CVE-2023-42115, and CVE-2023-42116 are “obtainable in a guarded repository and are ready to be applied by the distribution maintainers.”

“The remaining issues are debatable or miss out on information and facts we want to resolve them,” including it questioned ZDI extra particulars about the issues and that it “did not get answers we ended up in a position to get the job done with” right until Might 2023. The Exim crew even more stated they are awaiting in depth details on the other 3 shortcomings.

Having said that, the ZDI pushed again against claims about “sloppy dealing with” and “neither group pinging the other for 10 months,” stating it arrived at out various times to the builders.

“Soon after our disclosure timeline was exceeded by numerous months, we notified the maintainer of our intent to publicly disclose these bugs, at which time we have been informed, ‘you do what you do,'” it claimed.

“If these bugs have been correctly tackled, we will update our advisories with a link to the security advisory, code test-in, or other public documentation closing the issue.”

In the absence of patches, the ZDI suggests restricting conversation with the software as the only “salient” mitigation approach.

This is not the first time security flaws have been uncovered in the broadly utilised mail transfer agent. In May well 2021, Qualys disclosed a established of 21 vulnerabilities collectively tracked as 21Nails that allow unauthenticated attackers to achieve finish remote code execution and attain root privileges.

Forthcoming WEBINARFight AI with AI — Battling Cyber Threats with Next-Gen AI Tools

Completely ready to deal with new AI-pushed cybersecurity issues? Join our insightful webinar with Zscaler to handle the developing menace of generative AI in cybersecurity.

Supercharge Your Expertise

Earlier in Might 2020, the U.S. governing administration reported that hackers affiliated with Sandworm, a state-sponsored team from Russia, had been exploiting a critical Exim vulnerability (CVE-2019-10149, CVSS score: 9.8) to penetrate sensitive networks.

The improvement also comes incredibly hot on the heels of a new review by scientists from the College of California San Diego that learned a novel approach called forwarding-based mostly spoofing which normally takes gain of weaknesses in email forwarding to deliver messages impersonating legitimate entities, therefore compromising on integrity.

“The original protocol utilised to check out the authenticity of an email implicitly assumes that each business operates its own mailing infrastructure, with particular IP addresses not made use of by other domains,” the research identified.

“But now, a lot of corporations outsource their email infrastructure to Gmail and Outlook. As a result, thousands of domains have delegated the appropriate to send out email on their behalf to the exact 3rd party. Whilst these third-party suppliers validate that their people only mail email on behalf of domains that they work, this defense can be bypassed by email forwarding.”

Located this article intriguing? Comply with us on Twitter  and LinkedIn to read extra exceptional content material we put up.


Some pieces of this posting are sourced from:
thehackernews.com

Previous Post: «cybercriminals using new asmcrypt malware loader flying under the radar Cybercriminals Using New ASMCrypt Malware Loader Flying Under the Radar
Next Post: Iranian APT Group OilRig Using New Menorah Malware for Covert Operations iranian apt group oilrig using new menorah malware for covert»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.