10
CVSSv2

CVE-2019-15846

Published: 06/09/2019 Updated: 07/11/2023
CVSS v2 Base Score: 10 | Impact Score: 10 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 892
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

Exim prior to 4.92.2 allows remote malicious users to execute arbitrary code as root via a trailing backslash.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

exim exim

debian debian linux 8.0

debian debian linux 9.0

debian debian linux 10.0

Vendor Advisories

Exim could be made to run programs as an administrator if it received specially crafted network traffic ...
Exim could be made to run programs as an administrator if it received specially crafted network traffic ...
"Zerons" and Qualys discovered that a buffer overflow triggerable in the TLS negotiation code of the Exim mail transport agent could result in the execution of arbitrary code with root privileges For the oldstable distribution (stretch), this problem has been fixed in version 489-2+deb9u6 For the stable distribution (buster), this problem has be ...
Exim before 4922 allows remote attackers to execute arbitrary code as root via a trailing backslash(CVE-2019-15846) ...
Impact: Critical Public Date: 2019-09-06 CWE: CWE-119->CWE-787 Bugzilla: 1748397: CVE-2019-15846 exi ...
Exim before 4922 allows remote attackers to execute arbitrary code as root via a trailing backslash ...

Mailing Lists

An Update to the mitigation for the current CVE: Add - as part of the mail ACL (the ACL referenced by the main config option "acl_smtp_mail"): deny condition = ${if eq{\\}{${substr{-1}{1}{$tls_in_sni}}}} deny condition = ${if eq{\\}{${substr{-1}{1}{$tls_in_peerdn}}}} This should prevent the currently known attack vector Bes ...
On 2019-09-06 at 20:50 +0200, Sebastian Nielsen wrote: The connect ACL won't protect you against STARTTLS usage, which is far more common for email than TLS-on-connect I myself use the HELO ACL Blocking in the MAIL ACL is safe The problem is not in the TLS SNI itself The problem relates to safely storing the SNI in spool files for message ...
Shouldn't this be in connect ACL? How would the deny in MAIL FROM prevent the exploit? What I have understand is that there is exploit in the SNI of the TLS negotiation, thus the whole connect attempt must be rejected right? -----Ursprungligt meddelande----- Från: Exim-users <exim-users-bounces+sebastian=sebbeeu () exim org> För Heiko Sc ...
Heiko Schlittermann <hs () dmarc schlittermann de> (Fr 06 Sep 2019 12:20:39 CEST): This should block the most popular attack vector: In your MAIL ACL: deny condition = ${if eq{\\}{${substr{-1}{1}{$tls_in_sni}}}} message = sorry Best regards from Dresden/Germany Viele Grüße aus Dresden Heiko Schlittermann ...
Phil Pennock <pdp () exim org> (Sa 07 Sep 2019 02:52:56 CEST): This doesn't seem to be sufficient, you can start "submitting" a message to a remote Exim with the following sequence connect <-- 250 EHLO … <-- 250 STARTTLS <-- 220 MAIL <-- 250 The client is free to skip the 2nd E ...
Hi, Check this thread: wwwopenwallcom/lists/oss-security/2019/07/22/3 wwwopenwallcom/lists/oss-security/2019/07/22/8 Cheers! On 07/09/2019 01:33, akuster wrote: ...
Heiko Schlittermann <hs () nodmarc schlittermann de> (Mi 04 Sep 2019 11:22:48 CEST): As I saw blocked accesses to our security repo: If you're entitled to access our non-public security repository, please update your "remote" The git URL is now: ssh://git () git exim org/exim-security ssh://git () git exim org/exim-packages-secur ...
On 9/5/19 11:00 PM, Heiko Schlittermann wrote: If this is true, why is this on the public list? - armin ...
On 2019-09-07 at 08:23 +0200, Heiko Schlittermann wrote: Yeah sorry folks, that was a little embarrassing: my setup, and various common configurations (including apparently RedHat's) enforce EHLO-after-STARTTLS But that's Exim configuration, not hard-enforced in the code "Be lenient in what you accept" bah humbug Exim's default configur ...
*** Note: EMBARGO is still in effect! *** *** Distros must not publish any detail yet *** Head up! Security release ahead! CVE ID: CVE-2019-15846 Version(s): up to and including 4921 Issue: A local or remote attacker can execute programs with root privileges Details: Will be made public at CRD Currently there is ...
CVE ID: CVE-2019-15846 Credits: Zerons <sironhide0null () gmail com>, Qualys Version(s): all versions up to and including 4921 Issue: The SMTP Delivery process in all¹ versions up to and including Exim 4921 has a Buffer Overflow In the default runtime configuration, this is exploitable with crafted S ...
[ This is a re-post w/o dmarc protection of the sender (me) ] *** Note: EMBARGO is still in effect! *** *** Distros must not publish any detail yet *** In case you are entitled to access the security repo: *and* use the 4922+fixes branch: The branch got two new commits, fixing a small tool This tool is not designed to process untrusted ...

Github Repositories

nmap-cve2019-15846 Exim before 4922 allows remote attackers to execute arbitrary code as root via a trailing backslash The vulnerability is exploitable by sending a SNI ending in a backslash-null sequence during the initial TLS handshake The exploit exists as a POC For more details see doc/doc-txt/cve-2019-15846/ in the source code repository Reference: eximorg/s

PoC materials to exploit CVE-2019-15846

Exim CVE-2019-15846 PoC materials to exploit CVE-2019-15846 Blogpost explaining the PoC is available on Synacktiv Blog This PoC help generate spool files used exploit a heap overflow in exim Two example spool files are given in 1i7Jgy-0002dD-Pb-D and 1i7Jgy-0002dD-Pb-H A specialy crafted spool header file can be generated with exgenpy

Data Collection Related to Exim CVE-2019-10149

Exim CVE Data Collection Data Collection Related to Exim Vulnerabilities CVE-2019-10149, CVE-2019-15846, CVE-2019-16928 CVE Announcement: cvemitreorg/cgi-bin/cvenamecgi?name=CVE-2019-10149 Exploit Details: wwwexploit-dbcom/exploits/46974 Issue Timeline: seclistsorg/fulldisclosure/2019/Jun/16 NSA Advisory: mediadefensegov/2020/May/28/2002

PoC materials to exploit CVE-2019-15846

Exim CVE-2019-15846 PoC materials to exploit CVE-2019-15846 Blogpost explaining the PoC is available on Synacktiv Blog This PoC help generate spool files used exploit a heap overflow in exim Two example spool files are given in 1i7Jgy-0002dD-Pb-D and 1i7Jgy-0002dD-Pb-H A specialy crafted spool header file can be generated with exgenpy

Dorks for Google, Shodan and BinaryEdge

Dorks are cool Dorks for Google, Shodan and BinaryEdge Only for use on bug bounty programs or in cordination with a legal security assesment I am in no way responsible for the usage of these search queries Be responsible thanks - wwwbugcrowdcom/resource/what-is-responsible-disclosure/ This repository is "under construction" feel free to make pull requests

Recent Articles

Stop us if you've heard this one before: Yet another critical flaw threatens Exim servers
The Register • Shaun Nichols in San Francisco • 30 Sep 2019

Remote code flaw sparks calls for major updates Exim marks the spot… of remote code execution: Patch due out today for 'give me root' flaw in mail server

Admins of Linux and Unix boxes running Exim would be well-advised to update the software following the disclosure of another critical security flaw. The Exim 4.92.3 patch, released on September 28th, includes a fix to close up the CVE-2019-16928 flaw. Discovered by bug-hunters with the QAX A-Team, the vulnerability is caused by a buffer overflow error that occurs when Exim processes an extremely long string in an Extended HELO (EHLO) Extended Simple Mail Transfer Protocol (ESMTP) command message...

Exim marks the spot… of remote code execution: Patch due out today for 'give me root' flaw in mail server
The Register • Shaun Nichols in San Francisco • 06 Sep 2019

Install incoming update to avoid having your boxes hijacked Buffer overflow in Unix mailer Exim imperils 400,000 email servers

The widely used Exim email server software is due to be patched today to close a critical security flaw that can be exploited to potentially gain root-level access to the machine. The programming blunder can be abused over the network, or internet if the server is public facing, or by logged-in users to completely commandeer vulnerable installations, steal or tamper with data, install spyware, and so on. The vulnerability, designated CVE-2019-15846, has been kept under tight wraps. Details of th...

References

NVD-CWE-noinfohttp://exim.org/static/doc/security/CVE-2019-15846.txthttps://www.openwall.com/lists/oss-security/2019/09/06/1https://lists.debian.org/debian-lts-announce/2019/09/msg00004.htmlhttps://seclists.org/bugtraq/2019/Sep/13http://www.openwall.com/lists/oss-security/2019/09/06/2https://www.debian.org/security/2019/dsa-4517https://usn.ubuntu.com/4124-1/https://www.kb.cert.org/vuls/id/672565http://www.openwall.com/lists/oss-security/2019/09/06/4http://www.openwall.com/lists/oss-security/2019/09/06/5http://www.openwall.com/lists/oss-security/2019/09/06/6https://security.gentoo.org/glsa/201909-06http://www.openwall.com/lists/oss-security/2019/09/06/8http://www.openwall.com/lists/oss-security/2019/09/07/2http://www.openwall.com/lists/oss-security/2019/09/07/1http://www.openwall.com/lists/oss-security/2019/09/08/1http://www.openwall.com/lists/oss-security/2019/09/09/1http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00024.htmlhttps://usn.ubuntu.com/4124-2/https://exim.org/static/doc/security/CVE-2019-15846.txthttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NDF37AUNETIOXY6ZLQAUBGBVUTMMV242/https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FT3GY7V7SR2RHKNZNQCGXFWUSILVSZNU/https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SBNHDAF74RI6VK2JVSEIE3VYNL7JJDYM/https://nvd.nist.govhttps://usn.ubuntu.com/4124-1/https://www.kb.cert.org/vuls/id/672565