Article Details
Scrape Timestamp (UTC): 2023-10-02 21:55:09.520
Original Article Text
Click to Toggle View
Exim patches three of six zero-day bugs disclosed last week. Exim developers have released patches for three of the zero-days disclosed last week through Trend Micro's Zero Day Initiative (ZDI), one of them allowing unauthenticated attackers to gain remote code execution. Discovered by an anonymous security researcher, the security flaw (CVE-2023-42115) is due to an Out-of-bounds Write weakness found in the SMTP service and can be exploited by remote unauthenticated attackers to execute code in the context of the service account. "The specific flaw exists within the smtp service, which listens on TCP port 25 by default. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of a buffer," ZDI's advisory explains. "Fix a possible OOB write in the external authenticator, which could be triggered by externally-supplied input," the Exim development team says in the changelog of version 4.96.1, released today. Today, the Exim team also patched an RCE bug (CVE-2023-42114) and an information disclosure vulnerability (CVE-2023-42116). As Exim developer Heiko Schlittermann revealed on the Open Source Security (oss-sec) mailing list on Friday, today's fixes were already "available in a protected repository" and "ready to be applied by the distribution maintainers." The list of zero-day vulnerabilities that remain to be fixed includes: Not "a world-ending catastrophe" While tagged with a 9.8/10 severity score by the ZDI team, Exim says the successful exploitation of CVE-2023-42115—the most severe of the six zero-days disclosed by ZDI last week—is dependent on the use of external authentication on the targeted servers. Even though 3.5 million Exim servers are exposed online, according to Shodan, this requirement drastically reduces the number of Exim mail servers potentially vulnerable to attacks. An analysis of the six zero-days by watchTowr Labs confirms Exim's take on the severity of these zero-days as they "require a very specific environment to be accessible." watchTowr Labs also provided a list of all configuration requirements on vulnerable Exim servers needed for successful exploitation: "Most of us don't need to worry. If you're one of the unlucky ones who uses one of the listed features though, you'll be keen to get more information before undertaking ZDI's advice to 'restrict interaction with the application'," watchTowr researcher Aliz Hammond said. "So, our advice is the usual - patch when you can, once patches are available [..] But in the meantime, don't panic - this one is more of a damp squib than a world-ending catastrophe."
Daily Brief Summary
The developers of Exim, a popular open-source mail transfer agent, have released patches for three out of six disclosed zero-day vulnerabilities. These vulnerabilities were made public through Trend Micro's Zero Day Initiative (ZDI).
One of the bugs that was patched (CVE-2023-42115) could allow unauthenticated attackers to remotely execute codes due to an Out-of-Bounds Write problem in the SMTP service.
The security advisory suggests that this flaw comes from the lack of proper validation of users' data, which can result in a write past the end of a buffer.
In addition to this, two more vulnerabilities were patched by the Exim team
an RCE bug (CVE-2023-42114) and an information disclosure vulnerability (CVE-2023-42116).
The same vulnerabilities, with a severity score of 9.8/10 by ZDI team were regarded by Exim as not being 'world-ending catastrophes'. They claimed that successful exploitation of CVE-2023-42115 (the most severe) is contingent on use of external authentication on targeted servers.
According to analysis by watchTowr Labs, these zero-days "require a very specific environment to be accessible". Despite 3.5 million Exim servers being exposed online, the real number of potential vulnerable servers is likely much lower.