![]() Watchtowr have a nice write-up explaining that, by default, none of the six issues can be exploited. The Exim team have a different view on the severity, as do other reputable security specialists. On top of that amongst servers we manage for ourselves and clients there’s nearly a thousand installed copies of Exim that will need to be updated. Mythic Beasts make pretty heavy use of Exim in our mail infrastructure, and mitigating the security risk by turning off email is a pretty severe step while we wait for a fix. ZDI say ‘The only salient mitigation strategy is to restrict interaction with the application.’ and have allocated a scarily high severity score of 9.8/10. ![]() What makes this worse is that they claim they reported this in June 2022, and the Exim team have ignored fixing it. On the face of it, any server running Exim and listening on the internet can immediately be taken over by an attacker. It’s described as allowing remote attackers to execute arbitrary code on the Exim server without authentication. ![]() Recently Trend Micro, through their Zero Day Initiative, published a critical flaw for the Exim mail server. ![]() We sponsor exim and provide a VM for their buildfarm. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |