Vendor Solution
The vulnerability has been patched in version 4.92, which is currently available.
In addition, the maintainers for Exim have announced a public fix for the vulnerability which can be backported to all affected versions (4.87 - 4.91), although these are now technically said to be no longer officially supported.
Trend Micro Recommendation and Solutions
As with any vulnerability, Trend Micro highly recommends that users apply all critical patches and fixes that vendors provide for security issues as soon as possible. These patches will provide the strongest level of defense against any potential attacks.
Fortunately, Trend Micro has analyzed the information to see if proactive protection rules and filters may be created to help protect against potential attacks, and has deployed the following:
Product | Protection Type | Identifier |
---|---|---|
Deep Security | Intrusion Prevention Rule | 1009797 - Exim 'deliver_message' Command Injection Vulnerability (CVE-2019-10149) |
TippingPoint | DigitalVaccine (DV) Filter | 35520: SMTP: Exim Internet Mailer Command Injection Vulnerability |
Anti-Malware Products | Pattern File Detection | Trojan.SH.MIXBASH.A |