Article Details

Scrape Timestamp (UTC): 2023-09-30 04:19:25.726

Source: https://thehackernews.com/2023/09/new-critical-security-flaws-expose-exim.html

Original Article Text

Click to Toggle View

New Critical Security Flaws Expose Exim Mail Servers to Remote Attacks. Multiple security vulnerabilities have been disclosed in the Exim mail transfer agent that, if successfully exploited, could result in information disclosure and remote code execution. The list of flaws, which were reported anonymously way back in June 2022, is as follows - The most severe of the vulnerabilities is CVE-2023-42115, which allows remote, unauthenticated attackers to execute arbitrary code on affected installations of Exim. "The specific flaw exists within the SMTP service, which listens on TCP port 25 by default," the Zero Day Initiative said in an alert published this week. "The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of a buffer. An attacker can leverage this vulnerability to execute code in the context of the service account." Exim maintainers, in a message shared on the Open Source Security mailing list oss-security, said fixes for CVE-2023-42114, CVE-2023-42115, and CVE-2023-42116 are "available in a protected repository and are ready to be applied by the distribution maintainers." "The remaining issues are debatable or miss information we need to fix them," adding it asked ZDI more specifics about the issues and that it "didn't get answers we were able to work with" until May 2023. The Exim team further said they are awaiting detailed specifics on the other three shortcomings. However, the ZDI pushed back against claims about "sloppy handling" and "neither team pinging the other for 10 months," stating it reached out several times to the developers. "After our disclosure timeline was exceeded by many months, we notified the maintainer of our intent to publicly disclose these bugs, at which time we were told, 'you do what you do,'" it said. "If these bugs have been appropriately addressed, we will update our advisories with a link to the security advisory, code check-in, or other public documentation closing the issue." In the absence of patches, the ZDI recommends restricting interaction with the application as the only "salient" mitigation strategy. This is not the first time security flaws have been uncovered in the widely used mail transfer agent. In May 2021, Qualys disclosed a set of 21 vulnerabilities collectively tracked as 21Nails that enable unauthenticated attackers to achieve complete remote code execution and gain root privileges. Ready to tackle new AI-driven cybersecurity challenges? Join our insightful webinar with Zscaler to address the growing threat of generative AI in cybersecurity. Previously in May 2020, the U.S. government reported that hackers affiliated with Sandworm, a state-sponsored group from Russia, had been exploiting a critical Exim vulnerability (CVE-2019-10149, CVSS score: 9.8) to penetrate sensitive networks. The development also comes hot on the heels of a new study by researchers from the University of California San Diego that discovered a novel technique called forwarding-based spoofing which takes advantage of weaknesses in email forwarding to send messages impersonating legitimate entities, thereby compromising on integrity. "The original protocol used to check the authenticity of an email implicitly assumes that each organization operates its own mailing infrastructure, with specific IP addresses not used by other domains," the research found. "But today, many organizations outsource their email infrastructure to Gmail and Outlook. As a result, thousands of domains have delegated the right to send email on their behalf to the same third party. While these third-party providers validate that their users only send email on behalf of domains that they operate, this protection can be bypassed by email forwarding."

Daily Brief Summary

CYBERCRIME // Critical Security Vulnerabilities Uncovered in Exim Mail Transfer Agent

Multiple security flaws have been discovered in the Exim mail transfer agent that could allow for information leakage and remote code execution if adequately exploited.

The most severe one, CVE-2023-42115, permits remote, unauthenticated attackers to run arbitrary code on affected Exim installations, stemming from inadequate validation of user-provided data.

Fixes for issues CVE-2023-42114, CVE-2023-42115, and CVE-2023-42116 are currently available in a secure repository and ready for application by the distribution overseers.

The Zero Day Initiative (ZDI) recommends restricting interaction with the Exim application as a key mitigation strategy in the absence of patches for the remaining issues.

This incident follows previous revelations of security flaws in Exim, including a set of 21 vulnerabilities, known as 21Nails, disclosed by Qualys in May 2021, and a critical Exim vulnerability exploited by Russian state-sponsored group Sandworm reported by the U.S government in May 2020.

Recent research from the University of California San Diego highlighted a new method named forwarding-based spoofing that utilizes weaknesses in email forwarding to send emails impersonating legitimate entities, compromising email integrity.