Exim tls-openssl.c — Use-After-Free: unauthenticated Remote Code Execution
嗯,用户让我总结一篇文章的内容,控制在一百个字以内。首先,我需要仔细阅读文章,理解其主要内容。 文章标题是“Exim tls-openssl.c — Use-After-Free: unauthenticated Remote Code Execution”,看起来是关于Exim软件中的一个安全漏洞。CVSS评分是7.5,影响分数6.4,可利用性分数10,这意味着漏洞很严重且容易被利用。 漏洞的影响范围是远程攻击,不需要认证。攻击复杂度低,意味着攻击者相对容易发起攻击。影响方面包括部分机密性、完整性和可用性受损。 触发步骤涉及到准备一个易受攻击的Exim实例,通过SMTP会话和TLS协商来利用漏洞。攻击者发送特定的SMTP命令和载荷,导致use-after-free错误,进而执行恶意代码。 总结时要包含关键点:Exim软件版本(4.94.2之前)、漏洞类型(use-after-free)、影响(远程代码执行、无需认证)、CVSS评分以及触发条件。 控制在一百字以内,所以需要简洁明了。避免使用“文章内容总结”之类的开头语,直接描述内容。 </think> Exim 4.94.2前版本因tls-openssl.c中的Use-After-Free漏洞存在无认证远程代码执行风险。该漏洞CVSS评分为7.5/10,可远程触发无需认证的攻击。 2025-11-1 19:54:50 Author: cxsecurity.com(查看原文) 阅读量:98 收藏

Exim tls-openssl.c — Use-After-Free: unauthenticated Remote Code Execution

CVSS Base Score: 7.5/10

Impact Subscore: 6.4/10

Exploitability Subscore: 10/10

Exploit range: Remote

Attack complexity: Low

Authentication: No required

Confidentiality impact: Partial

Integrity impact: Partial

Availability impact: Partial

# Title: Exim tls-openssl.c — Use-After-Free → unauthenticated Remote Code Execution # CVE: CVE-2023-6553 # Test platform: vulnerable Exim build (<= the unpatched version prior to 4.94.2), configured to accept SMTP with TLS (OpenSSL) # Software version: Exim: versions before 4.94.2 (vulnerable code introduced around Exim 4.94). The issue is especially relevant for builds that provide TLS via OpenSSL. # Trigger step: Prepare an isolated Exim instance built/installed with the vulnerable version and OpenSSL enabled. Take a snapshot. Establish an SMTP session to the server and exercise the TLS negotiation (e.g., EHLO → STARTTLS) so the server uses the OpenSSL TLS code-path. Send a crafted sequence of SMTP commands and payloads that exploit the use-after-free in tls-openssl.c (Qualys’ advisory explains the general exploitation flow — corrupting a gstring-like buffer via server responses and later triggering expand_string() to execute ${run{...}}). The public discussion references use of MAIL FROM sequences around STARTTLS to cause the corruption. Observe oracle indicators: server-side process activity (spawned processes), filesystem changes, or a reverse connection. Collect logs, packet captures, and filesystem snapshots as evidence. # Oracle: Oracle / success indicators: after sending the crafted SMTP/TLS sequence the server will execute attacker-supplied actions (e.g., create files, spawn processes, run ${run{...}} expansions); logs, created files, spawned processes, or a reverse connection are evidence. Qualys describes using MAIL FROM and responses to overwrite data that later triggers expand_string() execution.

References:

https://nvd.nist.gov/vuln/detail/CVE-2020-28018




 

Thanks for you comment!
Your message is in quarantine 48 hours.

{{ x.nick }}

|

Date:

{{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1


{{ x.comment }}


文章来源: https://cxsecurity.com/issue/WLB-2025110003
如有侵权请联系:admin#unsafe.sh