Exim.string_interpret_escape.Remote.Code.Execution

description-logoDescription

This indicates an attack attempt to exploit a Remote Code Execution Vulnerability in Exim.
A remote, unauthenticated attacker can exploit this vulnerability by sending a handshake message with a crafted SNI to an Exim server that is configured to accept TLS connections. Successful exploitation will lead to the attacker being able to execute arbitrary code with the privileges of the root user.

affected-products-logoAffected Products

Exim Project Exim before 4.92.2

Impact logoImpact

System Compromise: Remote attackers can gain control of vulnerable systems.

recomended-action-logoRecommended Actions

Apply the most recent upgrade or patch from the vendor.
https://www.exim.org/static/doc/security/CVE-2019-15846.txt

Telemetry logoTelemetry

Coverage

IPS (Regular DB)
IPS (Extended DB)

Version Updates

Date Version Detail
2019-11-15 14.725 Default_action:pass:drop
2019-11-07 14.719