Article 3HH3E 400k servers may be at risk of serious code-execution attacks. Patch now

400k servers may be at risk of serious code-execution attacks. Patch now

by
Dan Goodin
from Ars Technica - All content on (#3HH3E)
ThinkstockPhotos-486791090-640x427.jpg

Hacker stock photos FTW. (credit: Thinkstock Photos)

A bug in an obscure but widely used email program may be putting as many as 400,000 servers around the world at risk of serious attack until they install an update.

The flaw-which is in all releases of the Exim message transfer agent except for version 4.90.1-opens servers to attacks that can execute malicious code, researchers who discovered the vulnerability warned in an advisory published Tuesday. The buffer overflow vulnerability, which is indexed as CVE-2018-6789, resides in base64 decode function. By sending specially manipulated input to a server running Exim, attackers may be able to remotely execute code.

A single byte of data resulting from an exploit "overwrites some critical data when the string fits some specific length," the researchers, from Devcore Security Consulting, wrote. "In addition, this byte is controllable, which makes exploitation more feasible. Base64 decoding is such a fundamental function, and therefore this bug can be triggered easily, causing remote code execution."

Read 2 remaining paragraphs | Comments

index?i=9p5R4Gruljo:cGFtCe0EQS4:V_sGLiPB index?i=9p5R4Gruljo:cGFtCe0EQS4:F7zBnMyn index?d=qj6IDK7rITs index?d=yIl2AUoC8zA
External Content
Source RSS or Atom Feed
Feed Location http://feeds.arstechnica.com/arstechnica/index
Feed Title Ars Technica - All content
Feed Link https://arstechnica.com/
Reply 0 comments