CyberSecurity news
do son@Cybersecurity News
//
A use-after-free vulnerability, tracked as CVE-2025-30232, has been discovered in the Exim mail transfer agent (MTA), a popular choice for Unix systems. The vulnerability affects Exim versions 4.96 through 4.98.1 and could allow attackers with command-line access to escalate privileges on affected systems. This could potentially lead to unauthorized access to system resources and the execution of arbitrary commands with elevated privileges, compromising the entire server.
It's crucial that systems run one of the vulnerable versions (4.96, 4.97, 4.98, or 4.98.1) and that the attacker has command-line access for exploitation. The Exim project has already released a patch in version 4.98.2 to address this flaw. System administrators are strongly advised to update to this latest version as soon as possible. The vulnerability was reported to Exim on March 13, 2025, by Trend Micro, with a security release made available to distribution maintainers on March 21 and public notification on March 25.
ImgSrc: securityonline.
References :
Classification:
- HashTags: #Exim #UseAfterFree #SecurityPatch
- Company: Exim
- Target: Unix Systems
- Product: Exim
- Feature: Privilege Escalation
- Malware: CVE-2025-30232
- Type: Vulnerability
- Severity: Critical