LWN: Comments on "Critical vulnerability in Exim" https://lwn.net/Articles/798628/ This is a special feed containing comments posted to the individual LWN article titled "Critical vulnerability in Exim". en-us Mon, 20 Oct 2025 23:23:56 +0000 Mon, 20 Oct 2025 23:23:56 +0000 https://www.rssboard.org/rss-specification lwn@lwn.net Critical vulnerability in Exim https://lwn.net/Articles/799069/ https://lwn.net/Articles/799069/ kmweber <div class="FormattedComment"> The most recent release version of Slackware uses sendmail, though sendmail was moved into /extra and replaced with postfix in -current a couple of years ago.<br> </div> Thu, 12 Sep 2019 22:16:43 +0000 Critical vulnerability in Exim https://lwn.net/Articles/799011/ https://lwn.net/Articles/799011/ anselm <p> The story I've heard is that while Eric Allman was writing Sendmail as a postgraduate student at UCB, he had to take a class on <a href="https://en.wikipedia.org/wiki/Production_system_(computer_science)">production systems</a>. This explains why, based on the time-honoured adage, “if the only tool you have is a hammer, all problems suddenly start looking like nails”, <tt>sendmail.cf</tt> defines a set of productions to handle e-mail. </p> Thu, 12 Sep 2019 11:46:04 +0000 MTAs in Debian https://lwn.net/Articles/799001/ https://lwn.net/Articles/799001/ grawity Hm, if the remote root exploit depends on the server accepting TLS connections, then Debian's default local-only configuration shouldn't be exploitable at all, is it? Thu, 12 Sep 2019 09:29:59 +0000 Critical vulnerability in Exim https://lwn.net/Articles/798989/ https://lwn.net/Articles/798989/ xose <div class="FormattedComment"> <font class="QuotedText">&gt; On Judgment Day Eric Allman will have some serious explaining to do.</font><br> <p> Already done: <a rel="nofollow" href="https://www.youtube.com/watch?v=Jmsxl8KNgLU">https://www.youtube.com/watch?v=Jmsxl8KNgLU</a><br> </div> Wed, 11 Sep 2019 21:37:46 +0000 Critical vulnerability in Exim https://lwn.net/Articles/798974/ https://lwn.net/Articles/798974/ Wol <div class="FormattedComment"> I don't think he'll have any 'splainin to do ...<br> <p> READ UP ON HISTORY!<br> <p> Eric Allman wrote a - simple - program that delivered mail, in an environment where malware didn't exist. Like so many things, it just "took off" and loads of people added loads of options - NOT ERIC. Then the Morris Worm hit ...<br> <p> Hindsight is a wonderful pair of reality-distortion specs ...<br> <p> Cheers,<br> Wol<br> </div> Wed, 11 Sep 2019 16:19:52 +0000 Critical vulnerability in Exim https://lwn.net/Articles/798970/ https://lwn.net/Articles/798970/ anselm <blockquote><em>[Sendmail was] a "start it and then it just works" kind of program, something I can decidedly not state about Postfix, although that may have improved since I was last forced to deail with its ailments some time in 2006.</em></blockquote> <p> It turns out that the debconf setup routine for Postfix in Debian is actually quite nice. It can deal with the standard use cases (local-only, local mail with a relay host, mail server on the Internet, …) out of the box and you can take it from there if you need more specialised configurations. Also, Postfix (a) has pretty good documentation and (b) has come a long way since 2006. </p> Wed, 11 Sep 2019 15:44:16 +0000 Critical vulnerability in Exim https://lwn.net/Articles/798969/ https://lwn.net/Articles/798969/ anselm <p> I used to be a Sendmail admin even before <tt>m4</tt>-style configuration was added to it, but I stopped using Sendmail in favour of Postfix at some point in the early 2000s and have never looked back. On Judgment Day Eric Allman will have some serious explaining to do. </p> Wed, 11 Sep 2019 15:32:45 +0000 Critical vulnerability in Exim https://lwn.net/Articles/798932/ https://lwn.net/Articles/798932/ rweikusat2 <div class="FormattedComment"> I wasn't writing about using it as internet-reachable mailer, just for the purpose of delivering mails written by me to some "destintation mail server". You seem to be a little bit behind the times here as the default configuration of being an open relay was changed to not relaying anything by default some time before 1998. Contrary to your implicit suggestion, I'm also not too stupid or incompetent to configure publically reachable mail servers in a sensible way. <br> <p> But that's rather besides the point I was trying to make, namely, that's a "start it and then it just works" kind of program, something I can decidedly not state about Postfix, although that may have improved since I was last forced to deail with its ailments some time in 2006.<br> <p> </div> Wed, 11 Sep 2019 14:22:43 +0000 Critical vulnerability in Exim https://lwn.net/Articles/798910/ https://lwn.net/Articles/798910/ ceplm <div class="FormattedComment"> Question is not whether it carried all emails it was supposed to carry, it is whether it didn’t carry many more emails it wasn’t. Sorry, cannot resist.<br> </div> Wed, 11 Sep 2019 07:36:33 +0000 Critical vulnerability in Exim https://lwn.net/Articles/798900/ https://lwn.net/Articles/798900/ rweikusat2 <div class="FormattedComment"> Sendmail has delivered every email I ever sent since 1998 without a single hiccup. I'm also using it with some "non-standard" features such as selecting a smart host based on the domain portion of a sender address. I have to admit that I also like the configuration language, although that's probably only something for people who are fond of accumulator machines :-).<br> </div> Tue, 10 Sep 2019 20:58:08 +0000 MTAs in Debian https://lwn.net/Articles/798861/ https://lwn.net/Articles/798861/ dskoll <p>Debian, by default, configures Exim (and possibly all of its MTAs?) to listen only on the loopback address. That converts a remote root exploit to a local root exploit... still pretty bad, but one small step less bad. <p>Presumably, if you're going to reconfigure your MTA for actual mail delivery from outside just localhost, you can uninstall Exim if your goal is to use another MTA. It's not a difficult extra step, as others have pointed out. Tue, 10 Sep 2019 14:13:38 +0000 Critical vulnerability in Exim https://lwn.net/Articles/798842/ https://lwn.net/Articles/798842/ LightDot <div class="FormattedComment"> Security guarantees are fine, but they are not what made the software secure in the first place.<br> <p> If anyone is aware of any issues in qmail's derivatives, such as netqmail, s/qmail, notqmail or qmail as distributed by Plesk, do report them.<br> </div> Tue, 10 Sep 2019 07:58:55 +0000 MTAs in Debian https://lwn.net/Articles/798840/ https://lwn.net/Articles/798840/ anselm <p> In practice, the fact that Debian defaults to Exim isn't a huge problem because (a) Exim isn't a completely unreasonable MTA (occasional CVEs notwithstanding) for casual use, (b) people tend to be very opinionated about their MTA preferences and there is no pleasing everyone at the same time, anyway, and (c) on Debian it is completely trivial to replace Exim with a different MTA such as Postfix if one is so inclined. </p> <p> It would of course be possible to have Debian default to Postfix instead of Exim, but since setting up an MTA usually involves quite a lot of configuration work in any case, starting that work off with <tt>apt-get install postfix</tt> doesn't really make a huge difference in the grand scheme of things, and the Debian project seems to think that it's not really worth the hassle to change what is an agreed-upon and, by now, well-established default. In fact if the change ever did get made then probably the Exim fans would complain loudly about the move away from Exim and the Sendmail and Courier fans would complain loudly that the move is not to Sendmail or Courier, so it's a good thing to keep this one in reserve in case all of the other gratuitous flame wars on the Debian lists ever fizzle out. </p> Tue, 10 Sep 2019 00:06:55 +0000 MTAs in Debian https://lwn.net/Articles/798836/ https://lwn.net/Articles/798836/ rahulsundaram <div class="FormattedComment"> <font class="QuotedText">&gt;respectively, exim gets picked as first because it is first in the alphabet … really</font><br> <p> It is a bit more complicated than that but in this case, it is because the shortest name wins<br> <p> <a href="http://yum.baseurl.org/wiki/CompareProviders.html">http://yum.baseurl.org/wiki/CompareProviders.html</a><br> </div> Mon, 09 Sep 2019 21:57:15 +0000 MTAs in Debian https://lwn.net/Articles/798835/ https://lwn.net/Articles/798835/ ceplm <div class="FormattedComment"> Certainly not that. I was just thinking about RHEL/Fedora which doesn’t hard write any mail-transport-agent provider as default (respectively, exim gets picked as first because it is first in the alphabet … really), but the default MTA is defined in comps as postfix, and it is selected (AFAIK) in the default installer, when the user defines computers as a mail server.<br> </div> Mon, 09 Sep 2019 20:53:44 +0000 MTAs in Debian https://lwn.net/Articles/798830/ https://lwn.net/Articles/798830/ rotty <div class="FormattedComment"> <font class="QuotedText">&gt; ... but other distributions managed to change (or at least allow) different MTA. Most of them used to be on sendmail, after all.</font><br> <p> Did you imply that you cannot change the MTA on Debian? I've been doing `apt-get install postfix` (or even ssmtp) after installing a fresh Debian install for, I'm not sure, at least a decade now? On Debian bullseye, these MTAs (although some are not real MTAs, like ssmtp, for instance) are currently at your disposal:<br> <p> % aptitude search '?provides(mail-transport-agent)' | awk '{ print $2; }'<br> citadel-server<br> courier-mta<br> dma<br> esmtp-run<br> exim4-daemon-heavy<br> exim4-daemon-light<br> masqmail<br> msmtp-mta<br> nullmailer<br> opensmtpd<br> postfix<br> qmail-run<br> sendmail-bin<br> ssmtp<br> <p> </div> Mon, 09 Sep 2019 18:00:27 +0000 Critical vulnerability in Exim https://lwn.net/Articles/798829/ https://lwn.net/Articles/798829/ niner <div class="FormattedComment"> Why would someone security-conscious use qmail? There's either the actually secure original qmail, or the actually useful in real world extended versions like netqmail for which any security guarantees are no longer valid.<br> </div> Mon, 09 Sep 2019 15:22:19 +0000 Critical vulnerability in Exim https://lwn.net/Articles/798750/ https://lwn.net/Articles/798750/ mgedmin <div class="FormattedComment"> Ubuntu picked Postfix as the default MTA back in 2005, if not earlier: <a href="https://help.ubuntu.com/community/Postfix?action=recall&amp;rev=6">https://help.ubuntu.com/community/Postfix?action=recall&amp;...</a><br> </div> Mon, 09 Sep 2019 12:31:38 +0000 Critical vulnerability in Exim https://lwn.net/Articles/798746/ https://lwn.net/Articles/798746/ vadim <div class="FormattedComment"> Just run it under Fedora, it's already got a well working SELinux configuration, which includes Exim<br> </div> Mon, 09 Sep 2019 08:10:52 +0000 Critical vulnerability in Exim https://lwn.net/Articles/798737/ https://lwn.net/Articles/798737/ ceplm <div class="FormattedComment"> I am sure about the latter (that nobody cared where Wietse Venema worked), but other distributions managed to change (or at least allow) different MTA. Most of them used to be on sendmail, after all.<br> </div> Mon, 09 Sep 2019 06:38:57 +0000 Critical vulnerability in Exim https://lwn.net/Articles/798732/ https://lwn.net/Articles/798732/ anselm <p> The Debian project would have adopted Postfix as the default MTA if Postfix had been ready to use at the time that the default MTA was being picked. Since Postfix wasn't quite finished then, the project settled on Exim as the next-best alternative, and Exim wasn't considered sufficiently worse than Postfix to be worth the trouble to switch defaults later. </p> <p> The fact that Postfix was started by Wietse Venema while he was under contract at IBM Research didn't play a significant role in the decision. </p> Sun, 08 Sep 2019 23:38:35 +0000 Critical vulnerability in Exim https://lwn.net/Articles/798720/ https://lwn.net/Articles/798720/ ceplm <div class="FormattedComment"> <font class="QuotedText">&gt; But, Postfix originated at IBM research, which never meshed well with distribution adoption.</font><br> <p> What??? It is only Debian (and Ubuntu) which still carry Exim as their default email server. Distros from Red Hat, SUSE, I believe everybody else switched to Postfix long time ago. And talking about SELinux, of course, it is tightly confined in Fedora/CentOS/RHEL.<br> <p> And I am quite certain that even Debian/Ubuntu have perfectly working packages of Postfix. There is just no reason at all not to switch.<br> </div> Sun, 08 Sep 2019 16:49:18 +0000 Critical vulnerability in Exim https://lwn.net/Articles/798717/ https://lwn.net/Articles/798717/ murukesh <div class="FormattedComment"> The Fedora docs[1] say:<br> <p> <p> <font class="QuotedText">&gt; Fedora offers two primary MTAs: Postfix and Sendmail. Postfix is configured as the default MTA and Sendmail is considered deprecated. </font><br> <p> Looks like there's a bug somewhere - either in the docs, or in the packaging.<br> <p> [1]: <a href="https://docs.fedoraproject.org/en-US/fedora/rawhide/system-administrators-guide/servers/Mail_Servers/#s1-email-mta">https://docs.fedoraproject.org/en-US/fedora/rawhide/syste...</a><br> </div> Sun, 08 Sep 2019 14:02:01 +0000 Critical vulnerability in Exim https://lwn.net/Articles/798713/ https://lwn.net/Articles/798713/ LightDot <div class="FormattedComment"> <font class="QuotedText">&gt; Anyone security-conscious has switched to Postfix since forever ...</font><br> <p> Or simply kept using qmail. ;)<br> </div> Sun, 08 Sep 2019 09:36:42 +0000 Critical vulnerability in Exim https://lwn.net/Articles/798702/ https://lwn.net/Articles/798702/ lsl <div class="FormattedComment"> The last time Fedora shipped an MTA by default, it was Sendmail. ;-)<br> <p> <a href="https://fedoraproject.org/wiki/Changes/NoDefaultSendmail">https://fedoraproject.org/wiki/Changes/NoDefaultSendmail</a> (though the proposal wasn't accepted for F20 IIRC)<br> <p> You're even listed there as the change owner.<br> <p> Now, you could argue that 10 releases is indeed forever in Fedora land and that even before that, most users chose Postfix as if it was the default.<br> <p> These days, Fedora (as opposed to EL) doesn't really have anything akin to a default MTA, no? A 'dnf install server(smtp)' results in Exim but that's more of an implementation artifact rather than a conscious decision for a default MTA.<br> </div> Sat, 07 Sep 2019 21:46:21 +0000 Critical vulnerability in Exim https://lwn.net/Articles/798688/ https://lwn.net/Articles/798688/ quotemstr <div class="FormattedComment"> Apple's "goto fail" was one line of code too.<br> </div> Sat, 07 Sep 2019 18:30:10 +0000 Critical vulnerability in Exim https://lwn.net/Articles/798681/ https://lwn.net/Articles/798681/ Matlib This is actually a bug in <tt>string.c</tt> (+ similar one in another file) causing a function to skip over the 0x0 at the end if the actual string ends with backslash. The POC is about leveraging this as heap overflow by sending a crafted TLS request to overwrite the name of the spool file and eventually send that as message content. I don't think this could be practically exploitable. <p>Several things that strike me most though: <ul> <li>this basic buffer overrun has existed since ever I am able to checkout (Oct 7 2004) and nobody noticed, <li>that it was reported in early August and fixed by Heiko on Aug 19 and did not make it to the 4.92.1 release, <li>that there is a dozen of mail, CVE forms <i>&amp;c.</i> filled in for one line of code added (<tt>if (ch == '\0') return **pp;</tt>) showing the unfortunate reality that many FOSS projects are a bureaucratic mess. </ul> Sat, 07 Sep 2019 13:20:35 +0000 MeTA1 (was Critical vulnerability in Exim) https://lwn.net/Articles/798667/ https://lwn.net/Articles/798667/ dskoll <p>Is anyone other than Claus Aßmann actually using MeTA1 in production? I got the feeling the project never really gained traction. Sat, 07 Sep 2019 00:53:55 +0000 Critical vulnerability in Exim https://lwn.net/Articles/798665/ https://lwn.net/Articles/798665/ xose <div class="FormattedComment"> <font class="QuotedText">&gt; You’re right, I though that by now, they’d have finished sendmail X, but it seems to have gone nowhere</font><br> <p> It is <a rel="nofollow" href="http://www.MeTA1.org">http://www.MeTA1.org</a><br> <p> More info at <a rel="nofollow" href="https://en.wikipedia.org/wiki/MeTA1">https://en.wikipedia.org/wiki/MeTA1</a> (currently down)<br> </div> Fri, 06 Sep 2019 22:26:24 +0000 Critical vulnerability in Exim https://lwn.net/Articles/798659/ https://lwn.net/Articles/798659/ mattdm <div class="FormattedComment"> <font class="QuotedText">&gt; But, Postfix originated at IBM research, which never meshed well with distribution adoption.</font><br> <p> Really? It's been the default in the Fedora ecosystem since, like, forever.<br> <p> (And no IBM jokes, please?)<br> </div> Fri, 06 Sep 2019 19:48:19 +0000 Critical vulnerability in Exim https://lwn.net/Articles/798653/ https://lwn.net/Articles/798653/ nim-nim <div class="FormattedComment"> <font class="QuotedText">&gt;&gt; I suppose sendmail should be ok-ish now it's been rewritten from scratch</font><br> <p> <font class="QuotedText">&gt; Huh! I hadn't heard that'd happened.</font><br> <p> You’re right, I though that by now, they’d have finished sendmail X, but it seems to have gone nowhere<br> <p> <font class="QuotedText">&gt; My main problem with Postfix (and the reason I'm using Exim) is that kept running into flexibility problems when using Postfix.</font><br> <p> Sure, that's the drawback of strong capability separation, you can’t configure a postfix component, outside its security capabilities, and many postfix documentation pages start with a flow diagram, explaining where a setting applies and what its limits are.<br> </div> Fri, 06 Sep 2019 19:24:58 +0000 Critical vulnerability in Exim https://lwn.net/Articles/798648/ https://lwn.net/Articles/798648/ quotemstr <div class="FormattedComment"> There's superuser and there's superuser though. I really need to start confining Exim with SELinux or something.<br> </div> Fri, 06 Sep 2019 18:15:12 +0000 Critical vulnerability in Exim https://lwn.net/Articles/798647/ https://lwn.net/Articles/798647/ quotemstr <div class="FormattedComment"> <font class="QuotedText">&gt; I suppose sendmail should be ok-ish now it's been rewritten from scratch</font><br> <p> Huh! I hadn't heard that'd happened. My main problem with Postfix (and the reason I'm using Exim) is that kept running into flexibility problems when using Postfix. Exim's general string substitution thing is super ugly, but it works, and it provides a lot of power. Sendmail is similarly (and infamously) configurable. I never thought I'd type these words, but: maybe I should switch to sendmail.<br> <p> <font class="QuotedText">&gt; The modular architecture used by Postfix is given in example in security classes. </font><br> <p> Exim is *supposed* to use a privilege separation system too.<br> </div> Fri, 06 Sep 2019 18:14:10 +0000 Critical vulnerability in Exim https://lwn.net/Articles/798645/ https://lwn.net/Articles/798645/ ametlwn <div class="FormattedComment"> <font class="QuotedText">&gt; At the very least, it needs to have better sandboxing. RCE is bad. But elevation to root? Why?</font><br> <p> A design choice. Exim offers amazing flexibility at the price of running as superuser at some time.<br> </div> Fri, 06 Sep 2019 18:01:30 +0000 Critical vulnerability in Exim https://lwn.net/Articles/798643/ https://lwn.net/Articles/798643/ nim-nim <div class="FormattedComment"> Anyone security-conscious has switched to Postfix since forever (I suppose sendmail should be ok-ish now it's been rewritten from scratch). The modular architecture used by Postfix is given in example in security classes. <br> <p> But, Postfix originated at IBM research, which never meshed well with distribution adoption.<br> </div> Fri, 06 Sep 2019 17:58:57 +0000 Critical vulnerability in Exim https://lwn.net/Articles/798637/ https://lwn.net/Articles/798637/ quotemstr <div class="FormattedComment"> At the very least, it needs to have better sandboxing. RCE is bad. But elevation to root? Why?<br> </div> Fri, 06 Sep 2019 17:13:24 +0000 Critical vulnerability in Exim https://lwn.net/Articles/798636/ https://lwn.net/Articles/798636/ mirabilos <div class="FormattedComment"> A week.<br> <p> Exim is worse than sendmail ever was. It should have never become this widespread.<br> </div> Fri, 06 Sep 2019 17:10:37 +0000 Critical vulnerability in Exim https://lwn.net/Articles/798632/ https://lwn.net/Articles/798632/ quotemstr <div class="FormattedComment"> Second major Exim vulnerability in, what, a year? Maybe I should consider switching.<br> </div> Fri, 06 Sep 2019 16:45:50 +0000