Critical Exim vulnerability affects 1.5 million servers worldwide

Why did the hacker bring an email attachment to the Exim server? Because it’s the only place where .exe files get VIP access without a bouncer.
CVE-2024-39929

A critical security vulnerability in the widely-used mail transfer agent (MTA) Exim has put over 1.5 million email servers at risk worldwide. This issue, identified as CVE-2024-39929, allows attackers to bypass Exim’s protection mechanism and deliver executable email attachments unfiltered to end users’ mailboxes. According to security experts at Censys, all Exim versions up to and including 4.97.1 are affected.

Exim is a highly popular MTA, especially on Unix-like operating systems, handling a substantial portion of email traffic globally. According to the Censys report, 74% of the 6.5 million SMTP mail servers are accessible via the Internet using Exim, equivalent to approximately 4.83 million servers. Of these, 1,567,109 are running vulnerable versions, including over 790,000 in the United States alone.

The vulnerability stems from an error in parsing RFC-2231 headers, which manage how file names in email attachments are encoded and interpreted. When exploited, this flaw can allow malicious attachments to bypass security filters that block specific file types, such as executables, from reaching users’ inboxes.

While no active exploitation cases have been reported, a proof of concept is available, suggesting that attackers could soon leverage this vulnerability. Censys has classified this CVE as critical, with a CVSS score of 9.1, indicating a high potential impact if exploited.

A patch for this vulnerability is available through the release of Exim 4.98. This version includes fixes not only for CVE-2024-39929 but also introduces several new features and improvements. Among these updates are enhancements to the DKIM (DomainKeys Identified Mail) mechanism, the ability to limit the number of recipients per message, and additional support for internal databases, including SQLite3.

This is not the first time Exim has faced critical security vulnerabilities. In September 2023, a different severe flaw reported by the Zero Day Initiative (ZDI) affected millions of Exim servers. However, a patch was delayed due to communication issues between the ZDI and Exim developers, exposing many systems for a prolonged period.

Posted by Alex Ivanovs

Alex is the lead editor at Stack Diary and covers stories on tech, artificial intelligence, security, privacy and web development. He previously worked as a lead contributor for Huffington Post for their Code column.