Exim.string_interpret_escape.Remote.Code.Execution
Description
This indicates an attack attempt to exploit a Remote Code Execution Vulnerability in Exim.
A remote, unauthenticated attacker can exploit this vulnerability by sending a handshake message with a crafted SNI to an Exim server that is configured to accept TLS connections. Successful exploitation will lead to the attacker being able to execute arbitrary code with the privileges of the root user.
Affected Products
Exim Project Exim before 4.92.2
Impact
System Compromise: Remote attackers can gain control of vulnerable systems.
Recommended Actions
Apply the most recent upgrade or patch from the vendor.
https://www.exim.org/static/doc/security/CVE-2019-15846.txt
Telemetry
Coverage
IPS (Regular DB) | |
IPS (Extended DB) |