Bypassing $mime_filename extension-blocking protection mechanism through misparsing of multiline RFC 2231 header filename
CVE-2024-39929

Currently unrated

Key Information:

Vendor
Exim
Vendor
CVE Published:
4 July 2024

Badges

💰 Ransomware👾 Exploit Exists🟡 Public PoC📰 News Worthy

Summary

The vulnerability identified as CVE-2024-39929 affects Exim, a popular mail transfer agent widely used in Unix-based systems. This vulnerability allows remote attackers to bypass the protection mechanism and potentially deliver executable attachments to end users' mailboxes. It has a CVSS score of 9.1 out of 10 and has been exploited. The vulnerability affects millions of servers running Exim, with a large number of potentially vulnerable instances in the United States, Russia, and Canada. While there are no reports of active exploitation, users are advised to apply patches promptly to mitigate the risk.

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

News Articles

Week in review: CrowdStrike update causes widespread IT outage, critical Splunk Enterprise flaw - Help Net Security

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Faulty CrowdStrike update takes out Windows machines

7 months ago

Vulnerability Chains – PSW #835

Find new flaws in UEFI using STASE, combining vulnerabilities to exploit Sonicwall Devices, remote BMC exploits, Netgear patches, and not a lot of information, 22 minutes before exploited, if the secrets were lost, we’d all be in screwed, Exim has not been replaced by something better and its ...

7 months ago

Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929) - Help Net Security

Exim developers have fixed a critical vulnerability (CVE-2024-39929) that can help attackers deliver malware to users.

7 months ago

References

Timeline

  • 🟡

    Public PoC available

  • 💰

    Used in Ransomware

  • 👾

    Exploit known to exist

  • 📰

    First article discovered by The Hacker News

  • Vulnerability published

  • Vulnerability Reserved

.