LOADING

Type to search

Critical Exim Mali Server Vulnerability Impacts 1.5 Million Email Servers

Cybersecurity News

Critical Exim Mali Server Vulnerability Impacts 1.5 Million Email Servers

Share
Critical Exim Mali Server Vulnerability Impacts 1.5 Million Email Servers

Security researchers have identified a critical Exim Mali Server vulnerability that currently affects more than 1.5 million email servers. This vulnerability, tracked as CVE-2024-39929, has a severity rating of 9.1 out of 10, highlighting its significant risk. It allows threat actors to bypass security protections and deliver executable attachments to user accounts, posing a severe threat to system integrity.

Exim, a free mail transfer agent, is widely used on Unix and Unix-like operating systems. Originally released in 1995 for use at the University of Cambridge, it has since become a staple in email server configurations. The identified vulnerability affects all versions of Exim up to and including 4.97.1. It arises from an error in parsing multiline headers as specified in RFC 2231, enabling attackers to bypass extension-blocking mechanisms and potentially deliver malicious executable attachments.

Heiko Schlittermann, a member of the Exim project team, confirmed the severity of the issue, stating, “I can confirm this bug. It looks like a serious security issue to me.” A recent analysis by security firm Censys revealed that out of the 6.5 million public-facing SMTP email servers, approximately 4.8 million (74%) run Exim. Among these, over 1.5 million are operating vulnerable versions, making them susceptible to potential attacks.

Historical Context and Risks

While there are no known reports of active exploitation of CVE-2024-39929, the ease of attack and the large number of vulnerable servers suggest that exploitation is imminent. This situation is reminiscent of the 2019 incident where the Kremlin-backed hacking group Sandworm exploited a severe Exim vulnerability (CVE-2019-10149) to execute malicious code with root system rights. Those attacks began two months after the vulnerability was disclosed and continued for nearly a year.

Release Candidate 3 of Exim 4.98 includes a fix for CVE-2024-39929. Administrators are strongly advised to update their systems to this latest version to mitigate the risk of exploitation. Despite the need for end users to click on an attached executable for the attack to succeed, the risk remains high due to the effectiveness of social engineering tactics commonly employed by attackers.

Steps to Quickly Patch

  1. Identify the Vulnerability

   Understand the specific vulnerability affecting your system. For Exim servers, the current critical vulnerability is tracked as CVE-2024-39929.

  1. Download the Patch

   Obtain the latest patch from the official Exim website or repository. For CVE-2024-39929, the fix is available in the Release Candidate 3 of Exim 4.98.

  1. Backup Your System

   Before applying any patches, ensure you have a complete backup of your server. This step is crucial to prevent data loss in case something goes wrong during the patching process.

  1. Apply the Patch

   Use the following steps to apply the patch:

 For Linux-based Systems:

  • SSH into Your Server:

Critical Exim Mali Server Vulnerability Impacts 1.5 Million Email Servers

  • Update Package Lists

Critical Exim Mali Server Vulnerability Impacts 1.5 Million Email Servers

  • Install the Latest Exim Version 

Critical Exim Mali Server Vulnerability Impacts 1.5 Million Email Servers

  • Verify the Installation

Critical Exim Mali Server Vulnerability Impacts 1.5 Million Email Servers

  • Ensure the version displayed is 4.98 or later.

Check Exim Service Status

Critical Exim Mali Server Vulnerability Impacts 1.5 Million Email Servers

Administrators should prioritize updating their Exim installations to the latest version to protect against this and other vulnerabilities. Proactive patch management is crucial in mitigating potential threats and ensuring the security and integrity of email servers. 

Author

  • Maya Pillai is a tech writer with 20+ years of experience curating engaging content. She can translate complex ideas into clear, concise information for all audiences.

    View all posts
Tags:
Maya Pillai

Maya Pillai is a tech writer with 20+ years of experience curating engaging content. She can translate complex ideas into clear, concise information for all audiences.

  • 1

Leave a Comment

Your email address will not be published. Required fields are marked *