cPanel

New csf v3.06

Changes:

  • Added System Exploit Checking. This enables lfd to check for the Random JS Toolkit and may check for others in the future:http://www.cpanel.net/security/notes/random_js_toolkit.htmlIt compares md5sums of the binaries listed in the exploit above for changes and also attempts to create and remove a number directory. The open is enabled by default. The report is generated from the exploitalert.txt template file

Exim Dictionary Attack ACL *Exploit*

If you’re still using our old exim_deny dictionary attack solution in cPanel you should stop doing so and exclusively use the one provided by cPanel in cPanel v11. An exploit vector has been found and published for our old method:http://paste2.org/p/12037However, using that exploit method would be quite tricky because the exim_deny.pl script generates that lock file when the very first email passes through the ACL after installation and from then on it wouldn’t be possible to use the above exploit. That is, someone would have to create the symlink as described in the time between you adding the ACL into exim and the first email arriving. Alternatively, if you actively and indiscriminately delete files from /tmp, then the exploit could be applied between the time of deleting the lock file and the next email passes through exim.Such a short window of opportunity makes the exploit as described extremely unlikely as the hacker would have no idea when you’re going to install the ACL or to do it in advance of installation.We’re not aware of anyone being exploited through the use of this method.Incidentally, if you’re running csf, then lfd would pick up this type of issue through LF_DIRWATCHMany thanks to Billy for bringing this to our attention.The simplest way to remove our old exim_deny method is to select the option in WHM > Exim Configuration Editor > Reset ACL Config to Defaults and then remove the exim_deny files:

rm -fv /etc/exim_deny /etc/exim_deny.pl /etc/exim_deny_whitelist /etc/cron.hourly/exim_deny.pl

PathTools v3.26 breaks MailScanner

On servers that are running the perl modules that are a part of PathTools, MailScanner breaks with the recently released v3.26. If you’re suffering from this issue you’ll see MailScanner continually restarting. If you run MailScanner in –debug you’ll see it SegFault. In /var/log/messages you’ll see continual:

MailScanner: Process did not exit cleanly, returned 0 with signal 11 

You can confirm which version of PathTools is installed using:

perl -MCwd -e ‘print “$Cwd::VERSION\n”‘

To fix this you need to downgrade PathTools to v3.2501:

wget http://search.cpan.org/CPAN/authors/id/K/KW/KWILLIAMS/PathTools-3.2501.tar.gztar -xzf PathTools-3.2501.tar.gzcd PathTools-3.2501perl Makefile.PL makemake installcd ..rm -Rfv PathTools-3.2501*

New MailScanner Script v2.63

Changes:

  • Added abort code if on a VPS running RH9 or earlier as we no longer support these ancient obsolete OS’s

New cse v1.6

Changes:

  • Modification to upload file procedure after another change by cPanel
  • Improved file viewing when clicking on the file name in the browser window

Upgrade by simply:

wget http://www.configserver.com/free/cse.tgztar -xzf cse.tgzcd csesh install.shcd ..rm -Rfv cse.tgz cse/

New MailScanner Script v2.62

Changes:

  • Optimised perl module list requirements
  • Added common LWP procedure which provides progress reporting for downloads
  • New Mailscanner v4.66.5:http://www.mailscanner.info/ChangeLog

New MailScanner Front-End (MSFE) v4.21

Changes:

  • Fixed bug in mailwatch for clamd report statistics
  • Added common LWP procedure which provides progress reporting for downloads

New csf v3.00

Changes:

  • Added progress information to LWP downloads within csf
  • Added numiptent checking for VPS servers. csf will flush iptables and lfd will stop blocking IP’s if numiptent is nearly depleted. This should help prevent VPS lockouts due to insufficient server resources. If this happens, you will either need to reduce the number of iptables rules (e.g. disable Block List usage) or have the VPS provider increase numiptent. A value of ~700-1000 should be fine for most SPI firewall applications with full Block List configuration
  • Added support for the BOGON List (Block List) with LF_BOGON – http://www.cymru.com/Bogons/ See link and csf.conf for more information
  • Enhanced the cpanel.net lookup for httpdupdate.cpanel.net to workaround the lack of rDNS PTR records
  • Fixed problem with RELAYHOSTS not working
  • Removed use of the replace binary

New MailScanner Front-End (MSFE) v4.19

We’ve released a new version of MSFE that will upgrade ClamAV and configure and install the clamd ClamAV Daemon process. The procedure will also reconfigure MailScanner to use clamd instead of the Mail::ClamAV perl module which will now no longer be required.We’ve made these changes for two reasons:1. It separates the dependency we’ve had on Mail::ClamAV keeping up with ClamAV developments. The current problem of incompatibility between v0.20 of Mail::ClamAV and ClamAV v0.92 has happened before and held back the upgrade to the latest version of ClamAV2. There is an added benefit that we’ve discovered where this change reduces each MailScanner child processes memory footprint by ~32MB. The clamd process uses around the same amount of memory, but there’s only a need for a single process. So, the saving on the typical system that runs 3 MailScanner children is ~64MBYou will notice that if you attempt to upgrade ClamAV through MSFE before upgrading MSFE itself, you’ll receive an error instructing you yo upgrade MSFE first.