[nsp-sec] Merak Mail server, TCP/32000 scanning
Smith, Donald
Donald.Smith at qwest.com
Tue Sep 16 15:24:08 EDT 2008
Chris, I have seen something like this in the past reported to the
handlers group and recall googling about it but not reaching a
conclusion.
However when I looked at the ports list at isc.sans.org I see several
LARGE spike in targets while sources are a bit spiky but range in the
6-30 range.
http://isc.sans.org/port.html?port=32000
# portascii.html
# Start Date: 2008-08-17
# End Date: 2008-09-16
# Port: 32000
# created: Tue, 16 Sep 2008 19:19:25 +0000
# Date in GMT. YYYY-MM-DD format.
date records targets sources tcpratio
2008-08-17 4240 2474 28 100
2008-08-18 28986 24043 22 100
2008-08-19 1127 374 24 100
2008-08-20 801 275 26 80
2008-08-21 1097 476 21 100
2008-08-22 827 364 24 100
2008-08-23 424 193 13 100
2008-08-24 561 274 15 100
2008-08-25 753 253 17 100
2008-08-26 669 226 19 100
2008-08-27 766 233 23 100
2008-08-28 709 223 19 100
2008-08-29 894 195 19 100
2008-08-30 433 152 21 99
2008-08-31 624 138 21 100
2008-09-01 664 183 28 100
2008-09-02 5782 1850 23 100
2008-09-03 1552 336 24 100
2008-09-04 1073 278 25 100
2008-09-05 1108 361 24 100
2008-09-06 1187 650 23 100
2008-09-07 1911 502 24 100
2008-09-08 1315 294 24 98
2008-09-09 21751 20173 30 100
2008-09-10 1614 535 27 100
2008-09-11 986 294 28 100
2008-09-12 2227 1402 22 100
2008-09-13 807 339 25 100
2008-09-14 1089 243 31 100
2008-09-15 1036 241 31 100
2008-09-16 409 131 23 99
# (c) SANS Inst. / DShield. some rights reserved.
# Creative Commons ShareAlike License 2.5
# http://creativecommons.org/licenses/by-nc-sa/2.5/
Security through obscurity WORKS against some worms and ssh attacks:)
Donald.Smith at qwest.com giac
> -----Original Message-----
> From: nsp-security-bounces at puck.nether.net
> [mailto:nsp-security-bounces at puck.nether.net] On Behalf Of
> Chris Calvert
> Sent: Tuesday, September 16, 2008 10:18 AM
> To: nsp-security at puck.nether.net
> Subject: [nsp-sec] Merak Mail server, TCP/32000 scanning
>
We've seen what appears to be scanning behaviour from a few hosts,
geographically distributed, some running versions of 8.x of Merak mail
server. They're hitting a number of IP addresses on TCP/32000.
Is anyone familiar with Merak Mailserver (aka IceWarp)?
http://www.merakserver.ca
http://www.merakserver.ca/about_us/
http://www.icewarp.com/
http://www.icewarp.com/products/icewarp_email_server_software/index.php
Interestingly, there were vulnerabilities in older versions of Merak
relevant to that port in the past:
http://osvdb.org/9045
... And something a bit more recent:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4559
"Description
mail/include.html in IceWarp Web Mail 5.5.1, as used by Merak Mail
Server
8.3.0r and VisNetic Mail Server version 8.3.0 build 1, does not properly
initialize the default_layout and layout_settings variables when an
unrecognized HTTP_USER_AGENT string is provided, which allows remote
attackers to access arbitrary files via a request with an unrecognized
User
Agent that also specifies the desired default_layout and layout_settings
parameters. "
Looks like TCP/32000 is the remote management port, and this could be
scanning for systems that could be leveraged as http proxies.
So far, we've seen hosts in Jerusalem (213.8.116.213, mail.mosesnet.net,
AS5486), Saudi Arabia (212.24.224.148, mail4.saudiconstco.com, AS29255),
and
another in Australia (129.180.224.250, mail.unepartnerships.edu.au,
AS24101), all appear to be mailservers for at least one domain. Look at
recent raw flows, we get a number of flows that are probably just
ephemeral
port matches, but a few hosts are definitely looking for hosts listening
on
TCP/3200.
129.180.224.250 mail.unepartnerships.edu.au.
Connected to 129.180.224.250.
+OK unepartnerships.edu.au Merak 8.0.3 POP3 Wed, 17 Sep 2008 01:45:49
+1000
<20080917014549 at unepartnerships.edu.au>
AS | IP | AS Name
24101 | 129.180.224.250 | UNE-AS-AP University of New England
213.8.116.213 mail.mosesnet.net.
Connected to 213.8.116.213.
+OK mail.mosesnet.net Merak 8.0.3 POP3 Tue, 16 Sep 2008 18:44:49 +0300
<20080916184449 at mail.mosesnet.net>
AS | IP | AS Name
5486 | 213.8.116.213 | SMILE-ASN Euronet Digital Communications,
(1992) LTD, Israel
212.24.224.148 mail4.saudiconstco.com.
Connected to 212.24.224.148.
+OK wplesk.zajil.net Merak 8.3.6 POP3 Tue, 16 Sep 2008 18:44:24 +0300
<20080916184424 at wplesk.zajil.net>
AS | IP | AS Name
29255 | 212.24.224.148 | ZAJIL-AS ZAJIL Autonomous Number in Saudi
Arabia
We're investigating for now, but can share some logs if someone in those
regions (or ISPs of the hosts) cares to investigate on their end.
Regards,
Chris
TELUS - ASN852
> ----------- nsp-security Confidential --------
>
>
This communication is the property of Qwest and may contain confidential or
privileged information. Unauthorized use of this communication is strictly
prohibited and may be unlawful. If you have received this communication
in error, please immediately notify the sender by reply e-mail and destroy
all copies of the communication and any attachments.
More information about the nsp-security
mailing list