PT-2024-4731 · Exim+4 · Exim+4

Phillip Szelat

·

Published

2024-07-04

·

Updated

2026-03-10

·

CVE-2024-39929

CVSS v2.0

6.4

Medium

AV:N/AC:L/Au:N/C:P/I:P/A:N
Name of the Vulnerable Software and Affected Versions:
Exim versions prior to 4.98 Exim versions 4.97.1 and earlier Exim versions 4.93-13ubuntu1.12 and earlier Exim versions 4.94.2-7+deb11u3 and earlier Exim versions 4.96-15+deb12u5 and earlier
Description:
Exim is vulnerable to a parsing error in multiline RFC 2231 header filenames. This allows remote attackers to bypass the $mime filename extension-blocking protection mechanism and potentially deliver executable attachments to user mailboxes. Approximately 1.56 million servers are potentially affected, with a significant concentration in the U.S., Russia, and Canada.
Recommendations:
Exim versions prior to 4.98: Upgrade to version 4.98 or later. Exim versions 4.97.1 and earlier: Upgrade to version 4.98 or later. Exim versions 4.93-13ubuntu1.12 and earlier: Upgrade to version 4.93-13ubuntu1.12 or later. Exim versions 4.94.2-7+deb11u3 and earlier: Upgrade to version 4.94.2-7+deb11u3 or later. Exim versions 4.96-15+deb12u5 and earlier: Upgrade to version 4.96-15+deb12u5 or later.

Exploit

Fix

Improper Encoding or Escaping of Output

Protection Mechanism Failure

Weakness Enumeration

Related Identifiers

BDU:2024-05250
CVE-2024-39929
DSA-5728-1
OESA-2024-2105
OESA-2024-2129
OPENSUSE-SU-2024:0218-1
OPENSUSE-SU-2024:14196-1
USN-6939-1

Affected Products

Astra Linux
Exim
Linuxmint
Red Os
Ubuntu