By
OCD Tech
June 13, 2019
•
5
min read

A critical remotecommand execution vulnerability was recently identified within Exim, the UNIXbased mail transfer agent. The vulnerability, tracked as CVE-2019-10149, affectsExim versions 4.87 through 4.91, and there is no patch as of today for theseolder versions. The latest version of Exim released February 10, 2019, Exim4.92, is not affected by this vulnerability.
The exploitation of CVE-2019-10149 allows for an attacker to execute commands with full administrative permissions on the target systems. This is due to the fact that the Exim mail transfer agent runs with root level privileges. This means that an attacker that successfully exploits this vulnerability could install additional malicious software; view, change, or delete data; or create backdoor user accounts with full administrative privileges.
Thevulnerability may be exploited by sending a specially crafted email message toa specific email address on a system’s localhost. A flaw was discovered in theway that Exim parses the email data, and this flaw can be leveraged in such away that allows the attacker to pass an arbitrary command to the execsv()function, which executes the command as root behind the scenes. For example, bysending a malicious email to a specific address, the attacker may be able toforce the system to download additional malware, create a new user, or uploadsensitive system information to an internet-accessible server owned andoperated by the attacker.
The severity of any vulnerability is directly related to its exploitability. For complex bugs that require significant time and resources to develop a working exploit, the risk is considered lower than for those vulnerabilities where a fully functional exploit is available. The mechanism required to exploit the Exim flaw has been deemed “trivial”, and is therefore easily exploitable by unsophisticated attackers. In fact, a full functional exploit has been developed and released to Exploit-DB.com, a popular online repository of exploit code.
Here at OCD Tech, we conducted some simple analysis to identify just how many vulnerable systems might exist on the internet. A search was conducted using the Shodan search engine which revealed that approximately 4 million systems around the world are running vulnerable versions of Exim. If you are running Exim on any of your systems, we would strongly suggest upgrading to version 4.92 as soon as possible, as it is only a matter of time before widespread exploitation of this critical vulnerability begins.
[wpforms id="10103" title="false" description="false"]

Audit. Security. Assurance.
IT Audit | Cybersecurity | IT Assurance | IT Security Consultants – OCD Tech is a technology consulting firm serving the IT security and consulting needs of businesses in Boston (MA), Braintree (MA) and across New England. We primarily serve Fortune 500 companies including auto dealers, financial institutions, higher education, government contractors, and not-for-profit organizations with SOC 2 reporting, CMMC readiness, IT Security Audits, Penetration Testing and Vulnerability Assessments. We also provide dark web monitoring, DFARS compliance, and IT general controls review.
Contact Info
OCD Tech
25 BHOP, Suite 407, Braintree MA, 02184
844-623-8324
https://ocd-tech.com
Follow Us
Videos
Check Out the Latest Videos From OCD Tech!
Services
SOC Reporting Services
– SOC 2 ® Readiness Assessment
– SOC 2 ®
– SOC 3 ®
– SOC for Cybersecurity ®
IT Advisory Services
– IT Vulnerability Assessment
– Penetration Testing
– Privileged Access Management
– Social Engineering
– WISP
– General IT Controls Review
IT Government Compliance Services
– CMMC
– DFARS Compliance
– FTC Safeguards vCISO