This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

IMAP connections getting blocked by IPS due to dovecot/Pigeon Hole Exploit

Hi

I've got 2 sites that users are complaining of intermittent (at best) connection/retrieval of emails. Checking the logs it is full of IPS blocks due to dovecot/pigeon hole remote code exploits.

The firewall log also has numerous entries of blocks of invalid traffic unable to match packet to connection and invalid TCP RST

Signatures
Detect
 
LAN user
External mail server
2300999
PROTOCOL-IMAP Dovecot and Pigeonhole Remote Code Execution Vulnerability
protocol-imap
Invalid Traffic
Denied
 
8
Port8
 
[LAN user]
[External mail server]
43182
143
TCP
1
01001
Open PCAP
Invalid TCP RST.
 
Invalid Traffic
Denied
 
0
Port8
 
[LAN User]
[External mail server]
43078
143
TCP
0
01001
Open PCAP
Could not associate packet to any connection.

It seems to come down to the default(?) IPS Policy lantowan_general and its single entry Migrate_def_filter_3 which has(amongst others).

PROTOCOL-IMAP Dovecot and Pigeonhole Remote Code Execution Vulnerability
2300999
protocol-imap
1 - Critical
Windows, Linux
Server
Drop packet

 

Interestingly in the IPS log it looks like the server is the victim rather than the clients. The clients range from windows 10, mac os, ipads, iphones.

log_type="IDP"
log_component="Signatures"
log_subtype="Detect"
ips_policy=""
ips_policy_id="0"
fw_rule_id="0"
user=""
sig_id="2300999"
message="PROTOCOL-IMAP Dovecot and Pigeonhole Remote Code Execution Vulnerability"
classification="Unknown"
rule_priority="1"
src_ip="[LAN client]"
src_country="R1"
dst_ip="[Ext mail server]"
dst_country="USA"
protocol="TCP"
src_port="45780"
dst_port="143"
OS="Linux,Windows"
category="protocol-imap"
victim="Server"

 



This thread was automatically locked due to age.