To keep you updated.... If you did not have changed your setup, it's time to do it now...

Am 07.06.2013 15:53, schrieb Cyborg:
https://www.redteam-pentesting.de/de/advisories/rt-sa-2013-001/-exim-with-dovecot-typical-misconfiguration-leads-to-remote-command-execution
theres now a Metasploit modul for this misconfiguration :

*Exim and Dovecot Insecure Configuration Command Injection* <http://packetstormsecurity.com/files/download/121958/exim4_dovecot_exec.rb.txt>

This Metasploit module exploits a command injection vulnerability against Dovecot with Exim using the "use_shell" option. It uses the sender's address to inject arbitrary commands since this is one of the user-controlled variables, which has been successfully tested on Debian Squeeze using the default Exim4 with dovecot-common packages.


--
## List details at https://lists.exim.org/mailman/listinfo/exim-users
## Exim details at http://www.exim.org/
## Please use the Wiki with this list - http://wiki.exim.org/

Reply via email to