CVE-2019-10149

critical

Description

A flaw was found in Exim versions 4.87 to 4.91 (inclusive). Improper validation of recipient address in deliver_message() function in /src/deliver.c may lead to remote command execution.

From the Tenable Blog

WatchBog Malware Adds BlueKeep Scanner (CVE-2019-0708), New Exploits (CVE-2019-10149, CVE-2019-11581)
WatchBog Malware Adds BlueKeep Scanner (CVE-2019-0708), New Exploits (CVE-2019-10149, CVE-2019-11581)

Published: 2019-07-25

Scanner for “BlueKeep” vulnerability and newly minted exploits for Exim and Jira incorporated into cryptocurrency mining malware.

CVE-2019-10149: Critical Remote Command Execution Vulnerability Discovered In Exim
CVE-2019-10149: Critical Remote Command Execution Vulnerability Discovered In Exim

Published: 2019-06-06

Researchers discover critical remote command execution vulnerability in older versions of Exim. Over 4.1 million systems are potentially vulnerable to local exploitation and remote exploitation is possible in non-default configurations.

References

https://arstechnica.com/security/2024/07/more-than-1-5-million-email-servers-running-exim-vulnerable-to-critical-attacks/

https://www.tenable.com/blog/sandworm-apt-deploys-new-swiftslicer-wiper-using-active-directory-group-policy

https://www.tenable.com/blog/government-advisories-warn-of-apt-activity-resulting-from-russian-invasion-of-ukraine

https://www.tenable.com/cyber-exposure/2020-threat-landscape-retrospective

https://www.tenable.com/blog/cve-2020-4006-vmware-command-injection-flaw-exploited-by-russian-state-sponsored-threat-actors

https://www.cisa.gov/news-events/cybersecurity-advisories/aa20-296a

https://www.tenable.com/blog/government-agencies-warn-of-state-sponsored-actors-exploiting-publicly-known-vulnerabilities

https://www.tenable.com/blog/cve-2019-10149-critical-remote-command-execution-vulnerability-discovered-in-exim

https://media.defense.gov/2020/May/28/2002306626/-1/-1/0/CSA%20Sandworm%20Actors%20Exploiting%20Vulnerability%20in%20Exim%20Transfer%20Agent%2020200528.pdf

https://www.tenable.com/blog/how-covid-19-response-is-expanding-the-cyberattack-surface

https://www.tenable.com/blog/cve-2019-16928-critical-buffer-overflow-flaw-in-exim-is-remotely-exploitable

https://www.tenable.com/blog/cve-2019-15846-unauthenticated-remote-command-execution-flaw-disclosed-for-exim

https://www.exim.org/static/doc/security/CVE-2019-10149.txt

https://www.debian.org/security/2019/dsa-4456

https://usn.ubuntu.com/4010-1/

https://security.gentoo.org/glsa/201906-01

https://seclists.org/bugtraq/2019/Jun/5

https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10149

http://www.securityfocus.com/bid/108679

http://www.openwall.com/lists/oss-security/2021/05/04/7

http://www.openwall.com/lists/oss-security/2019/07/26/4

http://www.openwall.com/lists/oss-security/2019/07/25/7

http://www.openwall.com/lists/oss-security/2019/07/25/6

http://www.openwall.com/lists/oss-security/2019/06/06/1

http://www.openwall.com/lists/oss-security/2019/06/05/4

http://www.openwall.com/lists/oss-security/2019/06/05/3

http://www.openwall.com/lists/oss-security/2019/06/05/2

http://seclists.org/fulldisclosure/2019/Jun/16

http://packetstormsecurity.com/files/154198/Exim-4.91-Local-Privilege-Escalation.html

http://packetstormsecurity.com/files/153312/Exim-4.91-Local-Privilege-Escalation.html

http://packetstormsecurity.com/files/153218/Exim-4.9.1-Remote-Command-Execution.html

http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00020.html

Details

Source: Mitre, NVD

Published: 2019-06-05

Updated: 2022-11-07

Risk Information

CVSS v2

Base Score: 10

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Severity: Critical

CVSS v3

Base Score: 9.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Severity: Critical