Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Multiple Exim Server Vulnerabilities Let Attackers Seize Control of the Server

Multiple Exim Server Vulnerabilities Let Attackers Seize Control of the Server

Posted on December 22, 2025December 22, 2025 By CWS

Safety researchers on the Nationwide Institute of Requirements and Know-how (NIST) have uncovered vital safety flaws within the Exim mail server. That might enable distant attackers to take full management of weak programs.

The vulnerabilities have an effect on Exim model 4.99 when configured with SQLite hints database help, exposing 1000’s of mail servers to potential compromise.

Two Important Flaws Found

The analysis staff recognized two distinct vulnerabilities in Exim’s SQLite database implementation.

The primary is an incomplete SQL injection repair for CVE-2025-26794 that fails to flee single-quote characters in database queries correctly.

Attackers can exploit this weak spot by sending specifically crafted SMTP instructions with malicious e-mail addresses containing SQL injection payloads.

The second vulnerability entails a heap buffer overflow brought on by unvalidated database fields used as array boundaries.

When the bloom filter code processes untrusted knowledge from the database, it could actually write far past allotted reminiscence buffers, probably corrupting as much as 1.5 megabytes of heap reminiscence.

CVE IDVulnerability TypeCWESeverityAttack VectorImpactRelated to CVE-2025-26794SQL Injection (Incomplete Repair)CWE-89HighRemote (SMTP)Arbitrary SQL question execution, knowledge exfiltrationPending AssignmentHeap Buffer OverflowCWE-122, CWE-787, CWE-843CriticalRemote (SMTP)Heap corruption, potential distant code execution

This offers attackers with exact management over reminiscence corruption, together with the power to focus on particular heap places and write arbitrary byte values.

These vulnerabilities require particular configurations to be exploitable. Servers have to be compiled with SQLite help and use rate-limited Entry Management Lists (ACLs) that incorporate attacker-controlled knowledge similar to sender addresses.

Probably the most weak configurations embrace “per_addr” mode with specific sender tackle keys or “distinctive” parameters containing attacker-controlled values.

Whereas researchers efficiently demonstrated heap corruption and reminiscence manipulation. They have been unable to develop a whole distant code-execution exploit due to fashionable safety protections, similar to Deal with Area Structure Randomization (ASLR).

Nonetheless, consultants warn that decided attackers with further time and sources might be able to obtain full system compromise.

Exim maintainers have been notified and are engaged on safety patches. The advisable fixes embrace including correct single quote escaping to stop SQL injection.

Implementing validation checks for database area sizes earlier than utilizing them as array boundaries.

Server directors utilizing Exim with SQLite hints databases ought to monitor for updates and apply patches instantly upon launch.

Organizations working probably weak configurations ought to contemplate briefly turning off SQLite trace database help.

Proscribing ratelimit ACL configurations that use sender addresses till patches can be found.

The analysis staff has dedicated to coordinated disclosure, giving builders time to create fixes earlier than publicly releasing full exploit particulars.

Comply with us on Google Information, LinkedIn, and X for every day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:Attackers, Control, Exim, Multiple, Seize, Server, Vulnerabilities

Post navigation

Previous Post: UK Government Acknowledges It Is Investigating Cyber Incident After Media Reports
Next Post: WatchGuard Patches Firebox Zero-Day Exploited in the Wild

Related Posts

ZendTo Vulnerability Let Attackers Bypass Security Controls and Access Sensitive Data ZendTo Vulnerability Let Attackers Bypass Security Controls and Access Sensitive Data Cyber Security News
AsyncRAT Uses Fileless Loader to Bypass Detections and Gain Remote Access AsyncRAT Uses Fileless Loader to Bypass Detections and Gain Remote Access Cyber Security News
Kali GPT- AI Assistant That Transforms Penetration Testing on Kali Linux Kali GPT- AI Assistant That Transforms Penetration Testing on Kali Linux Cyber Security News
New Malware-as-a-Service Olymp Loader Promises Defender-Bypass With Automatic Certificate Signing New Malware-as-a-Service Olymp Loader Promises Defender-Bypass With Automatic Certificate Signing Cyber Security News
Apache Struts Vulnerability Let Attackers Trigger Disk Exhaustion Attacks Apache Struts Vulnerability Let Attackers Trigger Disk Exhaustion Attacks Cyber Security News
Microsoft Asks IT Admins to Contact for Fix Related to Windows IIS Failure Issues Microsoft Asks IT Admins to Contact for Fix Related to Windows IIS Failure Issues Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News