Earlier this week; a patch for a potentially serious security vulnerability was made available. This vulnerability affects the Exim Mail Transfer Agent (MTA)(defined).
Details of the vulnerability were privately disclosed (defined) to the application vendor Exim by a security researcher Meh Chang from security firm Devcore Security Consulting in early February.
Why should this vulnerability be considered important?
Due to the pervasiveness of this software across the wider internet and the potential impact an exploit for this issue could have; if you are using the Exim Mail Transfer Agent software within your organisation, it may be at risk of exploitation with the potential for an attacker to achieve remote code execution (RCE)(defined: the ability for an attacker to remotely carry out any action of their choice on your device).
While the proof of concept (PoC)(defined) exploit for this vulnerability (a one byte buffer overflow (defined) is not trivial (described as “difficult” by the vendor) attackers are likely to try to exploit it given the wide impact it could have if successful.
How can I protect myself from this vulnerability?
Please update any Exim Mail Transfer Agent (MTA) server to version 4.90.1 A useful FAQ which may assist is located here with a wider set of FAQs located here.