After upgrading Exim4 to an official patched version fixing CVE-2019-10149 vulnerability (i.e. exim4_4.89-2+deb9u4) on my Debian stable server, I still get the "Message frozen" warnings about suspicious emails.
Is it expected, or should these suspicious emails be silently discarded ? I can't seem to understand how the patch affects this behaviour — I'd assume such emails would trigger the !parse_extract_address(…)
condition and therefore be logged and rejected, but it doesn't seem to be the case ?
As explained in the security advisory, in the example of the question linked in OP, the attacker is trying to trigger
RECIP_FAIL_LOOP
by setting a number ofReceived
headers greater than Exim's defaultreceived_headers_max
value (30).Here is what Exim4 does in this case :
That is, when an attacker attempts to exploit this vulnerability, Exim will send the warning email to the postmaster. But this is not where the vulnerability stands, so this code was not modified by the patch.
The vulnerability itself is in the following
if
block, which was fixed by the patch.Therefore, it is expected to receive numerous reports of attempts to exploit this vulnerability.