Skip to main content

Rapid Response Advisory: Exim MTA Bug Could Allow Malicious Email Attachments (CVE-2024-39929)

  • 12 July 2024
  • 0 replies
  • 35 views

 

This week the Censys Rapid Response team published an advisory on the recently disclosed Exim vulnerability tracked as CVE-2024-39929.

In Exim versions through 4.97.1, a bug in the parsing of multiline RFC 2231-encoded headers leads to incomplete parsing of attachment filenames. Remote actors could exploit this to bypass malicious file extension blocking measures and potentially send malicious attachments such as .exe executables undetected to users' email inboxes.

This bug is concerning due to how widespread Exim is on public-facing mail servers. Censys identifies around 1.5 million Exim servers online that are potentially vulnerable to this exploit.

However, exploiting this vulnerability alone is unlikely to fully compromise a server. Users need to actively click and execute attachments to trigger any embedded malicious code.

Check out the post for more information. The team has provided the following Censys queries to track affected devices:

 

If you have any questions about this vuln or have suggestions for detecting it with Censys, leave them here!

Be the first to reply!

Reply