CVE-2019-16928

9.8 CRITICAL

📋 TL;DR

CVE-2019-16928 is a heap-based buffer overflow vulnerability in Exim mail servers that allows remote attackers to execute arbitrary code by sending a specially crafted long EHLO command. This affects Exim installations running vulnerable versions, potentially compromising the entire mail server system. Organizations using Exim for email services are at risk.

💻 Affected Systems

Products:
  • Exim
Versions: 4.92 through 4.92.2
Operating Systems: Linux, Unix-like systems
Default Config Vulnerable: ⚠️ Yes
Notes: All Exim installations in the affected version range are vulnerable regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with root privileges, allowing attackers to install malware, exfiltrate data, pivot to internal networks, and maintain persistent access.

🟠

Likely Case

Remote code execution leading to mail server compromise, data theft, and potential use as a spam relay or foothold for further attacks.

🟢

If Mitigated

Limited impact with proper network segmentation and monitoring, potentially only affecting the Exim service itself.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation is straightforward and has been observed in the wild.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 4.92.3 and later

Vendor Advisory: https://bugs.exim.org/show_bug.cgi?id=2449

Restart Required: Yes

Instructions:

1. Download Exim 4.92.3 or later from exim.org. 2. Compile and install the new version. 3. Restart the Exim service. 4. Verify the patch is applied.

🔧 Temporary Workarounds

Rate limiting EHLO commands

linux

Limit the length of EHLO commands accepted by Exim to prevent exploitation.

Add 'acl_smtp_ehlo = acl_check_ehlo' to exim.conf and create appropriate ACL rules

Network filtering

linux

Block or filter long EHLO commands at network perimeter.

Use iptables or similar to drop packets with suspicious EHLO patterns

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Exim servers
  • Deploy intrusion detection systems to monitor for exploitation attempts

🔍 How to Verify

Check if Vulnerable:

Check Exim version with 'exim --version' or 'exim -bV' and verify if it's between 4.92 and 4.92.2

Check Version:

exim --version

Verify Fix Applied:

Confirm version is 4.92.3 or later using 'exim --version'

📡 Detection & Monitoring

Log Indicators:

  • Unusually long EHLO commands in mail logs
  • Failed authentication attempts following long EHLO
  • Process crashes or abnormal Exim behavior

Network Indicators:

  • TCP connections to Exim port 25 with payloads exceeding normal EHLO length
  • Multiple rapid connection attempts with varying EHLO strings

SIEM Query:

source="exim.log" EHLO* AND (length(EHLO) > 1000)

🔗 References

📤 Share & Export