Article 4GP52 Millions of machines affected by command execution flaw in Exim mail server

Millions of machines affected by command execution flaw in Exim mail server

by
Dan Goodin
from Ars Technica - All content on (#4GP52)
caution-800x534.jpg

Enlarge (credit: Michael Theis / Flickr)

Millions of Internet-connected machines running the open source Exim mail server may be vulnerable to a newly disclosed vulnerability that, in some cases, allows unauthenticated attackers to execute commands with all-powerful root privileges.

The flaw, which dates back to version 4.87 released in April 2016, is trivially exploitable by local users with a low-privileged account on a vulnerable system running with default settings. All that's required is for the person to send an email to "${run{...}}@localhost," where "localhost" is an existing local domain on a vulnerable Exim installation. With that, attackers can execute commands of their choice that run with root privileges.

The command execution flaw is also exploitable remotely, albeit with some restrictions. The most likely scenario for remote exploits is when default settings have been made such as:

Read 4 remaining paragraphs | Comments

index?i=5iU0LEmuWmE:kAY2T2ISTqM:V_sGLiPB index?i=5iU0LEmuWmE:kAY2T2ISTqM:F7zBnMyn index?d=qj6IDK7rITs index?d=yIl2AUoC8zA
External Content
Source RSS or Atom Feed
Feed Location http://feeds.arstechnica.com/arstechnica/index
Feed Title Ars Technica - All content
Feed Link https://arstechnica.com/
Reply 0 comments