퀄리스 연구원은 메일 서버의 절반 이상에 영향을 미치는 중요한 취약점을 발견.티he problem was detected in the Exim Mail Transfer Agent (MTA) 소프트웨어, 수취인에게 보낸 이메일을 전달하기위한 메일 서버에 설치되어있는.
유월을 위해 자료에 따르면 2019, 수출입이 설정되어 57% (507,389) 인터넷에있는 모든 서버의. 하나, there is information that in fact the number of Exim installations exceeds this number tenfold and is estimated as 5.4 백만.
Detected by 퀄리스 (Qualys) experts vulnerabilities affect software versions ...에서 4.87 에 4.91. 이 취약점은 원격 / 로컬 공격자가 수퍼 유저 권한으로 메일 서버에서 명령을 실행할 수 있습니다.
Local attacker, even with the lowest privileges, can exploit it immediately. 하나, the most dangerous are remote attackers who scan the Internet for vulnerable servers and are able to take control of vulnerable systems.
For remote exploitation of the default configuration, an attacker must maintain a connection to the vulnerable server for seven days (by sending one byte every few minutes).
“For transmitting one by one for each day (by transmitting one byte every few minutes). 하나, we cannot guarantee that this method of exploitation is unique; faster methods may exist”, – admit researchers.
게다가, they indicate that vulnerability can be exploited remotely not only with the default configuration settings.
The problem was fixed in the version of 수출입 4.92, released in February of this year. It is noteworthy that at the time of new software’s version release, vulnerability was not yet known, and it was fixed accidentally. Researchers discovered the problem only during the audit of old Exim versions.
Vulnerability assigned an identifier CVE-2019-10149, in Qualys, it passes under the name “마법사의 반환“.