Vulnerability in Exim software allows hackers to gain control of your mail server
Target: Exim users
Attack Vector: Remote code execution
A new critical vulnerability has been discovered in Exim, a widely developed mail transfer agent (MTA) used on Unix based operating systems. An attacker can exploit an off-by-one buffer overflow with a precisely constructed mail message. It is possible for attackers to exploit remotely without any authentication due to the nature of the vulnerability in relation to how SMTP transactions are conducted.
Risk assessment summary:
The threat is assessed as 3e MODERATE and the likelihood has been rated as POSSIBLE. If successful, by sending specially manipulated input to a server running Exim, attackers may be able to remotely execute code and take control of mail servers. Although a patch has been released, it may take weeks or even months for the vulnerability to be fully mitigated as users may not update their servers, leaving them at risk.