Hi
I've got 2 sites that users are complaining of intermittent (at best) connection/retrieval of emails. Checking the logs it is full of IPS blocks due to dovecot/pigeon hole remote code exploits.
The firewall log also has numerous entries of blocks of invalid traffic unable to match packet to connection and invalid TCP RST
Signatures
|
Detect
|
LAN user
|
External mail server
|
2300999
|
protocol-imap
|
Invalid Traffic
|
Denied
|
8
|
Port8
|
[LAN user]
|
[External mail server]
|
43182
|
143
|
TCP
|
1
|
Open PCAP
|
|
Invalid Traffic
|
Denied
|
0
|
Port8
|
[LAN User]
|
[External mail server]
|
43078
|
143
|
TCP
|
0
|
Open PCAP
|
It seems to come down to the default(?) IPS Policy lantowan_general and its single entry Migrate_def_filter_3 which has(amongst others).
PROTOCOL-IMAP Dovecot and Pigeonhole Remote Code Execution Vulnerability
|
2300999
|
protocol-imap
|
1 - Critical
|
Windows, Linux
|
Server
|
Drop packet
|
Interestingly in the IPS log it looks like the server is the victim rather than the clients. The clients range from windows 10, mac os, ipads, iphones.
log_type="IDP"
log_component="Signatures"
log_subtype="Detect"
ips_policy=""
ips_policy_id="0"
fw_rule_id="0"
user=""
sig_id="2300999"
message="PROTOCOL-IMAP Dovecot and Pigeonhole Remote Code Execution Vulnerability"
classification="Unknown"
rule_priority="1"
src_ip="[LAN client]"
src_country="R1"
dst_ip="[Ext mail server]"
dst_country="USA"
protocol="TCP"
src_port="45780"
dst_port="143"
OS="Linux,Windows"
category="protocol-imap"
victim="Server"
This thread was automatically locked due to age.