A security issue in remote execution orders (RCE from remote command execution) affects more than half of Internet e-mail servers, according to researchers of Qualys security.
The vulnerability affects Exim, a mail transfer agent (MTA), which is software that runs on e-mail servers to transmit messages from sender to recipient.
According to one research Of all mail servers visible on the Internet, 57% (507,389) of all servers run Exim.
In a security alert, Qualys, a cybersecurity company that specializes in cloud security, said it found a very dangerous vulnerability in Exim installations in versions 4.87 to 4.91.
The vulnerability is described as RCE and is different from, but equally dangerous as, a remote code execution vulnerability that allows a local or remote attacker to run commands on the Exim server as root.
Qualys said the vulnerability could be exploited directly by a local attacker who has a physical presence on an email server, even with a low-profile account.
But the real danger comes from remote hackers who exploit the vulnerability, as they can scan the Internet for vulnerable servers and compromise systems.
"Due to the extreme complexity of the Exim code, we can not guarantee that this method of exploitation is unique, there may be faster methods."
In addition, the Qualys team reports that the vulnerability was fixed completely by accident:
The vulnerability was fixed with the release of Exim 4.92 on February 10, 2019, but at the time version 4.92 was released, they were unaware of the security vulnerability.
It was discovered recently by the Qualys team when testing older versions of Exim, and are now warning Exim users to update to version 4.92.
________________
- Amazon, Apple, Facebook, & Google: great anti-monopoly research from the US
- ProtonMail suspected to cooperate with the authorities
- Samsung is trying to get Huawei's customers