Bypassing $mime_filename extension-blocking protection mechanism through misparsing of multiline RFC 2231 header filename
CVE-2024-39929

5.4MEDIUM

Key Information:

Vendor
Exim
Vendor
CVE Published:
4 July 2024

Badges

💰 Ransomware👾 Exploit Exists🟡 Public PoC🟣 EPSS 28%📰 News Worthy

Summary

The vulnerability identified as CVE-2024-39929 affects Exim, a popular mail transfer agent widely used in Unix-based systems. This vulnerability allows remote attackers to bypass the protection mechanism and potentially deliver executable attachments to end users' mailboxes. It has a CVSS score of 9.1 out of 10 and has been exploited. The vulnerability affects millions of servers running Exim, with a large number of potentially vulnerable instances in the United States, Russia, and Canada. While there are no reports of active exploitation, users are advised to apply patches promptly to mitigate the risk.

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

News Articles

Week in review: CrowdStrike update causes widespread IT outage, critical Splunk Enterprise flaw - Help Net Security

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Faulty CrowdStrike update takes out Windows machines

Vulnerability Chains – PSW #835

Find new flaws in UEFI using STASE, combining vulnerabilities to exploit Sonicwall Devices, remote BMC exploits, Netgear patches, and not a lot of information, 22 minutes before exploited, if the secrets were lost, we’d all be in screwed, Exim has not been replaced by something better and its ...

Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929) - Help Net Security

Exim developers have fixed a critical vulnerability (CVE-2024-39929) that can help attackers deliver malware to users.

References

EPSS Score

28% chance of being exploited in the next 30 days.

CVSS V3.1

Score:
5.4
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

Timeline

  • 🟡

    Public PoC available

  • 💰

    Used in Ransomware

  • 👾

    Exploit known to exist

  • 📰

    First article discovered by The Hacker News

  • Vulnerability published

  • Vulnerability Reserved

.