Search found 147 matches

by maxxer
Thu May 09, 2019 4:09 pm
Forum: Users
Topic: Images in Signatures
Replies: 3
Views: 1477

Re: Images in Signatures

steelbricks wrote:Is this occuring in 8.8 versions?


It seems to be a bonus of patched 8.6 only :/
by maxxer
Thu May 02, 2019 2:38 pm
Forum: Administrators
Topic: CVE-2019-9670 being actively exploited
Replies: 241
Views: 181929

Re: CVE-2019-9670 being actively exploited

yellowhousejake wrote:I still thought it best to see if I should patch for this exploit but I am unable to determine if it is needed. When I go the security page it does not list this CVE number under any patches for 8.8.9.

for current zimbra supported version, namely 8.8.x, you must update to the latest version.
by maxxer
Thu May 02, 2019 6:42 am
Forum: Administrators
Topic: CVE-2019-9670 being actively exploited
Replies: 241
Views: 181929

Re: CVE-2019-9670 being actively exploited

halfgaar wrote:Maxxer, you may want to be more explicit in your blog post about changing the LDAP password


done, thanks
by maxxer
Mon Apr 29, 2019 7:47 am
Forum: Administrators
Topic: CVE-2019-9670 being actively exploited
Replies: 241
Views: 181929

Re: CVE-2019-9670 being actively exploited

How many accounts do you have? There is an account export function, per account, that you could use perhaps. It would be relatively easy to write a bash script to do that for all accounts. Like this in a loop: this is unreliable. see bgo#101760 . Nowadays better use ZeXtas migration tool, it's free...
by maxxer
Sat Apr 27, 2019 1:12 pm
Forum: Administrators
Topic: CVE-2019-9670 being actively exploited
Replies: 241
Views: 181929

Re: CVE-2019-9670 being actively exploited

Looked for jsp files and didn't find anything suspicious around. Is there a way to prevent linux from creating the zmcat file for example? so that if deletes it immediately? Did you try the dpkg/rpm commands to check for modified files? To prevent zmcat creation create it yourself then chown root a...
by maxxer
Fri Apr 26, 2019 6:58 pm
Forum: Administrators
Topic: CVE-2019-9670 being actively exploited
Replies: 241
Views: 181929

Re: CVE-2019-9670 being actively exploited

Has anyone with recurring infections checked if the attacker uploaded a key to /opt/zimbra/.ssh/authorized_keys? Or if there are remote ssh logins for the zimbra user?
by maxxer
Fri Apr 26, 2019 2:55 pm
Forum: Administrators
Topic: CVE-2019-9670 being actively exploited
Replies: 241
Views: 181929

Re: CVE-2019-9670 being actively exploited

The infection is (obviously) start mutating: an user reported high cpu usage from /opt/zimbra/log/zmswatch binary
by maxxer
Fri Apr 26, 2019 12:12 pm
Forum: Administrators
Topic: CVE-2019-9670 being actively exploited
Replies: 241
Views: 181929

Re: CVE-2019-9670 being actively exploited

uncelvel wrote:Hi Guy.
Some update for this Bug.
Now they are exists in

Code: Select all

/var/tmp
folder

you mean zmcat executable is being downloaded into that directory?
by maxxer
Fri Apr 26, 2019 8:36 am
Forum: Administrators
Topic: CVE-2019-9670 being actively exploited
Replies: 241
Views: 181929

Re: CVE-2019-9670 being actively exploited

tin wrote:Is there another exploit/bug?


If you're on 8.6 there's an additional patch (P14) for IMAP
by maxxer
Wed Apr 24, 2019 1:54 pm
Forum: Administrators
Topic: CVE-2019-9670 being actively exploited
Replies: 241
Views: 181929

Re: CVE-2019-9670 being actively exploited

I have followed https://lorenzo.mile.si/zimbra-cve-2019-9670-being-actively-exploited-how-to-clean-the-zmcat-infection/961/ to cleanup all malicious jsp files and patched the system. Did you try restarting Zimbra after removing all the crappy jsp/java files? I had a similar situation once and resta...

Go to advanced search