Critical vulnerability that bypasss attachment filter found in Exim Mail Transfer
Take action: Patch ASAP. If you are running Exim SMTP server be conscious that attackers can smuggle malicious attachments even if you have blocked them in configuration. Communicate to your users to be extra careful with attachments until you manage to patch Exim to the patched version.
Learn More
Exim, a widely-used mail transfer agent, has been identified with a critical vulnerability that allows attackers to bypass its attachment filter, potentially enabling the delivery of malicious code attachments to users' mailboxes.
The vulnerability is tracked as CVE-2024-39929 (CVSS score 9.1) arises when Exim processes multiline header filenames according to RFC 2231. This flaw allows attackers to bypass the $mime_filename extension-blocking protection mechanism, enabling them to smuggle potentially harmful executable attachments into users' mailboxes.
Affected versions are Exim versions up to and including 4.97.1
A bug fix has been included in Release Candidate 3 of Exim version 4.98. Users of Exim are strongly advised to update their mailer to this or a newer version, or at least to update to 4.98 when it becomes generally available.