A number of Zero day exploits that have not been addressed in over a year have been made public.
https://www.zerodayinitiative.com/advis ... I-23-1469/
Reported to vendor in June 2022 apparently.
EXIM has some issues
EXIM has some issues
Just 'cause I link to a page and say little else doesn't mean I am not being nice.
https://www.hmailserver.com/documentation
https://www.hmailserver.com/documentation
Re: EXIM has some issues
I'll play it safe and stick with hmailserver.
Re: EXIM has some issues
This is really Dangerous, it's a RCE Bug (Remote Code Execution). A Attacker can use a peace of Assembly code (a so called exploit) and target this bug by simply using a script (for example a python script) to connect to Exim.on port 25 and execute the exploit within the Exim process (which runs under root/ Super user permissions).mattg wrote: ↑2023-10-03 00:46A number of Zero day exploits that have not been addressed in over a year have been made public.
https://www.zerodayinitiative.com/advis ... I-23-1469/
Reported to vendor in June 2022 apparently.
This can be used to takeover the entire Machine with Operating System Superuser permissions. A Attacker can do anything, delete files, modify anything, install new software or install a crypto miner to generate bitcoins or use the box as zombie bot for DDOS Attacks, can modify or delete legit user accounts, steal all the Emails plus Attachements etc. it''s a real Sysadmin Nightmare.
Re: EXIM has some issues
So the moral of the story is; Run hMailServer under a low-privilege account.Dravion wrote: ↑2023-10-03 09:48This is really Dangerous, it's a RCE Bug (Remote Code Execution). A Attacker can use a peace of Assembly code (a so called exploit) and target this bug by simply using a script (for example a python script) to connect to Exim.on port 25 and execute the exploit within the Exim process (which runs under root/ Super user permissions).mattg wrote: ↑2023-10-03 00:46A number of Zero day exploits that have not been addressed in over a year have been made public.
https://www.zerodayinitiative.com/advis ... I-23-1469/
Reported to vendor in June 2022 apparently.
This can be used to takeover the entire Machine with Operating System Superuser permissions. A Attacker can do anything, delete files, modify anything, install new software or install a crypto miner to generate bitcoins or use the box as zombie bot for DDOS Attacks, can modify or delete legit user accounts, steal all the Emails plus Attachements etc. it''s a real Sysadmin Nightmare.
SørenR.
To understand recursion, you must first understand recursion.
To understand recursion, you must first understand recursion.