Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Multiple Exim Server Vulnerabilities Let Attackers Seize Control of the Server

Posted on December 22, 2025December 22, 2025 By CWS

Safety researchers on the Nationwide Institute of Requirements and Know-how (NIST) have uncovered vital safety flaws within the Exim mail server. That might enable distant attackers to take full management of weak programs.

The vulnerabilities have an effect on Exim model 4.99 when configured with SQLite hints database help, exposing 1000’s of mail servers to potential compromise.

Two Important Flaws Found

The analysis staff recognized two distinct vulnerabilities in Exim’s SQLite database implementation.

The primary is an incomplete SQL injection repair for CVE-2025-26794 that fails to flee single-quote characters in database queries correctly.

Attackers can exploit this weak spot by sending specifically crafted SMTP instructions with malicious e-mail addresses containing SQL injection payloads.

The second vulnerability entails a heap buffer overflow brought on by unvalidated database fields used as array boundaries.

When the bloom filter code processes untrusted knowledge from the database, it could actually write far past allotted reminiscence buffers, probably corrupting as much as 1.5 megabytes of heap reminiscence.

CVE IDVulnerability TypeCWESeverityAttack VectorImpactRelated to CVE-2025-26794SQL Injection (Incomplete Repair)CWE-89HighRemote (SMTP)Arbitrary SQL question execution, knowledge exfiltrationPending AssignmentHeap Buffer OverflowCWE-122, CWE-787, CWE-843CriticalRemote (SMTP)Heap corruption, potential distant code execution

This offers attackers with exact management over reminiscence corruption, together with the power to focus on particular heap places and write arbitrary byte values.

These vulnerabilities require particular configurations to be exploitable. Servers have to be compiled with SQLite help and use rate-limited Entry Management Lists (ACLs) that incorporate attacker-controlled knowledge similar to sender addresses.

Probably the most weak configurations embrace “per_addr” mode with specific sender tackle keys or “distinctive” parameters containing attacker-controlled values.

Whereas researchers efficiently demonstrated heap corruption and reminiscence manipulation. They have been unable to develop a whole distant code-execution exploit due to fashionable safety protections, similar to Deal with Area Structure Randomization (ASLR).

Nonetheless, consultants warn that decided attackers with further time and sources might be able to obtain full system compromise.

Exim maintainers have been notified and are engaged on safety patches. The advisable fixes embrace including correct single quote escaping to stop SQL injection.

Implementing validation checks for database area sizes earlier than utilizing them as array boundaries.

Server directors utilizing Exim with SQLite hints databases ought to monitor for updates and apply patches instantly upon launch.

Organizations working probably weak configurations ought to contemplate briefly turning off SQLite trace database help.

Proscribing ratelimit ACL configurations that use sender addresses till patches can be found.

The analysis staff has dedicated to coordinated disclosure, giving builders time to create fixes earlier than publicly releasing full exploit particulars.

Comply with us on Google Information, LinkedIn, and X for every day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:Attackers, Control, Exim, Multiple, Seize, Server, Vulnerabilities

Post navigation

Previous Post: UK Government Acknowledges It Is Investigating Cyber Incident After Media Reports
Next Post: WatchGuard Patches Firebox Zero-Day Exploited in the Wild

Related Posts

Armenian Hacker Extradited to U.S. After Ransomware Attacks on Tech Firms Cyber Security News
Apache Tomcat Security Vulnerabilities Expose Servers to Remote Code Execution Attacks Cyber Security News
Gemini CLI to Your Kali Linux Terminal To Automate Penetration Testing Tasks Cyber Security News
New PerfektBlue Attack Exposes Millions of Cars to Remote Hacking Cyber Security News
Windows User Account Control Bypassed Using Character Editor to Escalate Privileges Cyber Security News
Microsoft Released an Emergency Security Update to Patch a Critical SharePoint 0-Day Vulnerability Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Hackers Exploiting .onmicrosoft.com Domains to Launch TOAD Scam Attack
  • Gambit Cyber Raises $3.4 Million in Seed Funding
  • Firewall Exploits, AI Data Theft, Android Hacks, APT Attacks, Insider Leaks & More
  • Ukrainian Nefilim Ransomware Affiliate Pleads Guilty in US
  • WatchGuard Patches Firebox Zero-Day Exploited in the Wild

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Hackers Exploiting .onmicrosoft.com Domains to Launch TOAD Scam Attack
  • Gambit Cyber Raises $3.4 Million in Seed Funding
  • Firewall Exploits, AI Data Theft, Android Hacks, APT Attacks, Insider Leaks & More
  • Ukrainian Nefilim Ransomware Affiliate Pleads Guilty in US
  • WatchGuard Patches Firebox Zero-Day Exploited in the Wild

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark