Security Market Segment LS
Friday, 14 June 2019 07:46

Mail servers running Exim come under attack Featured

Mail servers running Exim come under attack Pixabay

Mail servers running the Exim mail transport agent are being exploited, with the attackers using a vulnerability disclosed a few days ago to run arbitrary commands as root, a security practitioner has warned.

Exim, one of the four MTAs commonly used on Unix servers, is developed by Phillip Hazel at the University of Cambridge. It is the default on some Linux distributions, like Debian.

As usual, there are various guesstimates about the number of servers running Exim, with figures ranging from 57% or about 600,000 to 5.4 million being bandied about.

The vulnerability allows for remote command execution where an attacker could execute arbitrary commands as root. Versions 4.87 to 4.91 were said to be vulnerable, with a fix having been Incorporated into 4.92.

Amit Serper of the company Cybereason said the attackers were downloading a script from a hidden service on a Tor server, which installed OpenSSH server if it was not present on the target.

The script would then reconfigure the OpenSSH configuration file to allow root logins along with an RSA public/private key pair.

"That means that if your server was exploited, the attackers have root access to your server via private/public key authentication," Serper said.

The original post about the vulnerability was released by Qualys Research Labs on 5 June, which said it was trivially exploitable in local and non-default cases, but with the default configuration an attack would take a long time to succeed.

Qualys said: "This vulnerability is exploitable instantly by a local attacker (and by a remote attacker in certain non-default configurations). To remotely exploit this vulnerability in the default configuration, an attacker must keep a connection to the vulnerable server open for seven days (by transmitting one byte every few minutes).

"However, because of the extreme complexity of Exim's code, we cannot guarantee that this exploitation method is unique; faster methods may exist."

Satnam Narang, senior research engineer at security outfit Tenable, said: "Attackers have started probing for, and experimenting with attacks against Exim systems vulnerable to CVE-2019-10149.

"Security researchers have observed active exploitation in the wild, one of which includes an attack resulting in permanent root access to vulnerable systems via SSH.

"It is critically important for those running Exim to upgrade to version 4.92 or apply the backported fix to vulnerable versions in order to prevent these newly discovered attacks from succeeding."

Advisories and fixes have been listed in a post from the National Vulnerability Database.


26-27 February 2020 | Hilton Brisbane

Connecting the region’s leading data analytics professionals to drive and inspire your future strategy

Leading the data analytics division has never been easy, but now the challenge is on to remain ahead of the competition and reap the massive rewards as a strategic executive.

Do you want to leverage data governance as an enabler?Are you working at driving AI/ML implementation?

Want to stay abreast of data privacy and AI ethics requirements? Are you working hard to push predictive analytics to the limits?

With so much to keep on top of in such a rapidly changing technology space, collaboration is key to success. You don't need to struggle alone, network and share your struggles as well as your tips for success at CDAO Brisbane.

Discover how your peers have tackled the very same issues you face daily. Network with over 140 of your peers and hear from the leading professionals in your industry. Leverage this community of data and analytics enthusiasts to advance your strategy to the next level.

Download the Agenda to find out more


Sam Varghese

website statistics

Sam Varghese has been writing for iTWire since 2006, a year after the site came into existence. For nearly a decade thereafter, he wrote mostly about free and open source software, based on his own use of this genre of software. Since May 2016, he has been writing across many areas of technology. He has been a journalist for nearly 40 years in India (Indian Express and Deccan Herald), the UAE (Khaleej Times) and Australia (Daily Commercial News (now defunct) and The Age). His personal blog is titled Irregular Expression.



Recent Comments