ID: IRCNE2012101660
Date: 2012-10-30
According to "techworld", developers of the popular Exim email server software released an emergency update on Friday to address a critical vulnerability that could allow attackers to execute malicious code on the underlying operating system.
The vulnerability was located in the code responsible for performing DomainKeys Identified Mail (DKIM) verifications, a feature enabled by default in Exim installations.
The patched vulnerability is a heap-based buffer overflow and can be exploited by anyone who can send email from a domain name for which they control the DNS (Domain Name System) records, Exim developer Phil Pennock said Friday in an email announcing the release of Exim 4.80.1.
"This is a SECURITY release, addressing a CRITICAL remote code execution flaw in versions of Exim between 4.70 and 4.80 inclusive, when built with DKIM support," Pennock said.
The vulnerability is rated as critical and was identified during an internal review of the DKIM-related code in Exim.
The code review was prompted by two DKIM implementation issues that were disclosed last week and affected multiple email providers including Google, Microsoft and Yahoo.
Exim is one of the most popular mail transfer agents. It is installed by default in Debian Linux and other Debian-based Linux distributions like Ubuntu. It is also commonly used together with the popular Mailman mailing list software and the cPanel Web hosting server administration platform.
Most Linux vendors have already released updated Exim packages through their respective repositories, so users are encouraged to install them.
- 2