This blog contains information about the 21 Nails Exim vulnerabilities. As soon as we have an update, we’ll add it to this post. More information about possible risks and details can be found at the bottom of this blog.
Update May 4, 2021
22:00 | Newly discovered vulnerabilities in the Exim mail transfer agent (MTA) allow attackers to execute code and gain root privilege on servers running Exim. The vulnerabilities together have been named 21Nails because there are 11 locally exploitable weaknesses and 10 remote. This can lead to allow attackers to fully compromise the mailservers.
Direct patching is highly recommended. For systems older than version 4.94 this should be done with some policy, because the configuration of older versions still needs to be adjusted slightly for the update to work. This is because of an extra security measure in version 4.94.2.
Reason and background of this blog
This blog contains information about vulnerabilities, the possible risk and advice on how to prevent or limit damage. Below are the possible risks, details and background information.
In the Netherlands, just under 180,000 systems are vulnerable (see image below):
The following CVE references belong to this vulnerability. More information:
|Link aanval in de log directory van Exim
|Assorted attacks in Exim’s spool directory
|Arbitrary file creation and clobbering
|Arbitrary file deletion
|Heap buffer overflow in queue_run()
|Heap out-of-bounds write in main()
|Heap buffer overflow in parse_fix_phrase()
|Heap out-of-bounds write in parse_fix_phrase()
|New-line injection into spool header file (local)
|Missing close-on-exec flag for privileged pipe
|Integer overflow in get_stdinput()
|Integer overflow in receive_add_recipient()
|Integer overflow in receive_msg()
|Out-of-bounds read in smtp_setup_msg()
|New-line injection into spool header file (remote)
|Heap out-of-bounds read and write in extract_option()
|Line truncation and injection in spool_read_header()
|Failure to reset function pointer after BDAT error
|Heap buffer underflow in smtp_ungetc()
|Use-after-free in tls-openssl.c
|Heap out-of-bounds read in pdkim_finish_bodyhash()
Do you want to be informed in time? Sign up for our technical updates
Would you like to receive these critical vulnerabilities by e-mail from now on? Enter your e-mail address below.