CVE-2019-16928: a new vulnerability on Exim exposes millions of email servers to remote attacks
Another potential RCE in Exim! Let's update, folks!
Jeremy Harris, from Exim Development Team, has discovered a heap-based buffer overflow issue in all versions of Exim servers up to and including 4.92.1.
The vulnerability (CVE-2019-16928) could allow remote attackers to cause a denial of service or execute arbitrary code on a targeted Exim mail server using a specially crafted line in the EHLO command with the rights of the targeted user: currently the public PoC exploit for this vulnerability allows only crash the Exim process by sending a long string in the EHLO command, though other commands could also be used to potentially execute arbitrary code.
Is there a patch?
Yep! Exim maintainers released an urgent security update after publishing the early warning, giving system administrators an early head-up on its upcoming security patches:
Fix
===
Download and build the fixed version 4.92.3
Tarballs: https://ftp.exim.org/pub/exim/exim4/
Git: https://github.com/Exim/exim.git
- tag exim-4.92.3
- branch exim-4.92.3+fixes
The tagged commit is the officially released version. The +fixes branch
isn't officially maintained, but contains the security fix *and* useful
fixes.
If you can't install the above versions, ask your package maintainer for
a version containing the backported fix. On request and depending on our
resources we will support you in backporting the fix.