After upgrading Exim4 to an official patched version fixing CVE-2019-10149 vulnerability (i.e. exim4_4.89-2+deb9u4) on my Debian stable server, I still get the "Message frozen" warnings about suspicious emails.
Is it expected, or should these suspicious emails be silently discarded ? I can't seem to understand how the patch affects this behaviour — I'd assume such emails would trigger the !parse_extract_address(…)
condition and therefore be logged and rejected, but it doesn't seem to be the case ?
Answer
As explained in the security advisory, in the example of the question linked in OP, the attacker is trying to trigger RECIP_FAIL_LOOP
by setting a number of Received
headers greater than Exim's default received_headers_max
value (30).
Here is what Exim4 does in this case :
case RECIP_FAIL_LOOP:
new->message = US"Too many \"Received\" headers - suspected mail loop";
post_process_one(new, FAIL, LOG_MAIN, EXIM_DTYPE_ROUTER, 0);
break;
That is, when an attacker attempts to exploit this vulnerability, Exim will send the warning email to the postmaster. But this is not where the vulnerability stands, so this code was not modified by the patch.
The vulnerability itself is in the following if
block, which was fixed by the patch.
Therefore, it is expected to receive numerous reports of attempts to exploit this vulnerability.
No comments:
Post a Comment