• chevron_right

      Critical vulnerabilities in Exim threaten over 250k email servers worldwide

      news.movim.eu / ArsTechnica · Friday, 29 September, 2023 - 22:59 · 1 minute

    Critical vulnerabilities in Exim threaten over 250k email servers worldwide

    Enlarge (credit: Getty Images)

    Thousands of servers running the Exim mail transfer agent are vulnerable to potential attacks that exploit critical vulnerabilities, allowing remote execution of malicious code with little or no user interaction.

    The vulnerabilities were reported on Wednesday by Zero Day Initiative, but they largely escaped notice until Friday when they surfaced in a security mail list. Four of the six bugs allow for remote code execution and carry severity ratings of 7.5 to 9.8 out of a possible 10. Exim said it has made patches for three of the vulnerabilities available in a private repository. The status of patches for the remaining three vulnerabilities—two of which allow for RCE—are unknown. Exim is an open source mail transfer agent that is used by as many as 253,000 servers on the Internet.

    “Sloppy handling” on both sides

    ZDI provided no indication that Exim has published patches for any of the vulnerabilities, and at the time this post went live on Ars, the Exim website made no mention of any of the vulnerabilities or patches. On the OSS-Sec mail list on Friday, an Exim project team member said that fixes for two of the most severe vulnerabilities and a third, less severe one are available in a “protected repository and are ready to be applied by the distribution maintainers.”

    Read 13 remaining paragraphs | Comments

    • chevron_right

      Millions of servers inside data centers imperiled by flaws in AMI BMC firmware

      news.movim.eu / ArsTechnica · Thursday, 20 July, 2023 - 19:29 · 1 minute

    Futuristic Data Center Server Room

    Enlarge (credit: Getty Images )

    Two years ago, ransomware crooks breached hardware-maker Gigabyte and dumped more than 112 gigabytes of data that included information from some of its most important supply-chain partners, including Intel and AMD. Now researchers are warning that the leaked booty revealed what could amount to critical zeroday vulnerabilities that could imperil huge swaths of the computing world.

    The vulnerabilities reside inside firmware that Duluth, Georgia-based AMI makes for BMCs, or baseband management controllers. These tiny computers soldered into the motherboard of servers allow cloud centers, and sometimes their customers, to streamline the remote management of vast fleets of computers. They enable administrators to remotely reinstall OSes, install and uninstall apps, and control just about every other aspect of the system—even when it's turned off. BMCs provide what’s known in the industry as “lights-out” system management.

    Lights out forever

    Researchers from security firm Eclypsium analyzed AMI firmware leaked in the 2021 ransomware attack and identified vulnerabilities that had lurked for years. They can be exploited by any local or remote attacker with access to an industry-standard remote-management interface known as Redfish to execute malicious code that will run on every server inside a data center.

    Read 18 remaining paragraphs | Comments

    • chevron_right

      Researchers unearth Windows backdoor that’s unusually stealthy

      news.movim.eu / ArsTechnica · Thursday, 16 February, 2023 - 21:21

    A cartoon door leads to a wall of computer code.

    Enlarge (credit: BeeBright / Getty Images / iStockphoto )

    Researchers have discovered a clever piece of malware that stealthily exfiltrates data and executes malicious code from Windows systems by abusing a feature in Microsoft Internet Information Services (IIS).

    IIS is a general-purpose web server that runs on Windows devices. As a web server, it accepts requests from remote clients and returns the appropriate response. In July 2021, network intelligence company Netcraft said there were 51.6 million instances of IIS spread across 13.5 million unique domains.

    IIS offers a feature called Failed Request Event Buffering that collects metrics and other data about web requests received from remote clients. Client IP addresses and port and HTTP headers with cookies are two examples of the data that can be collected. FREB helps administrators troubleshoot failed web requests by retrieving ones meeting certain criteria from a buffer and writing them to disk. The mechanism can help determine the cause of 401 or 404 errors or isolate the cause of stalled or aborted requests.

    Read 7 remaining paragraphs | Comments

    • chevron_right

      Critical Windows code-execution vulnerability went undetected until now

      news.movim.eu / ArsTechnica · Monday, 19 December, 2022 - 18:46

    Skull and crossbones in binary code

    Enlarge (credit: Getty Images )

    Researchers recently discovered a Windows code-execution vulnerability that has the potential to rival EternalBlue, the name of a different Windows security flaw used to detonate WannaCry, the ransomware that shut down computer networks across the world in 2017.

    Like EternalBlue, CVE-2022-37958, as the latest vulnerability is tracked, allows attackers to execute malicious code with no authentication required. Also, like EternalBlue, it’s wormable, meaning that a single exploit can trigger a chain reaction of self-replicating follow-on exploits on other vulnerable systems. The wormability of EternalBlue allowed WannaCry and several other attacks to spread across the world in a matter of minutes with no user interaction required.

    But unlike EternalBlue, which could be exploited when using only the SMB, or server message block, a protocol for file and printer sharing and similar network activities, this latest vulnerability is present in a much broader range of network protocols, giving attackers more flexibility than they had when exploiting the older vulnerability.

    Read 6 remaining paragraphs | Comments