• Please be aware: Kaspersky Anti-Virus has been deprecated
    With the upgrade to Plesk Obsidian 18.0.64, "Kaspersky Anti-Virus for Servers" will be automatically removed from the servers it is installed on. We recommend that you migrate to Sophos Anti-Virus for Servers.
  • The Horde webmail has been deprecated. Its complete removal is scheduled for April 2025. For details and recommended actions, see the Feature and Deprecation Plan.
  • We’re working on enhancing the Monitoring feature in Plesk, and we could really use your expertise! If you’re open to sharing your experiences with server and website monitoring or providing feedback, we’d love to have a one-hour online meeting with you.

Help with PCI compliance | SMTP SSL | Courier IMAP | Port 3306

Deoxymono

New Pleskian
Info: Parallels Plesk Panel v10.3.1 / OS: CentOS 5

Hello, I need some help with PCI compliance on a VPS. I've already fixed a few different problems, yet could do with help/clarification on the following scan failings by SecurityMetrics as its starting to give me a headache :(

---------------------------
1st Failure:

Protocol: TCP | Port: 143 | Program: imap | Score: 7.5

Summary:

Title: possible format string vulnerability in Courier IMAP Impact: A remote attacker could execute arbitrary commands.

Resolution: [http://www.courier-mta.org/download.php#imap] Upgrade to Courier IMAP 3.0.4 or higher, or set DEBUG_LOGIN equal to the default value of 0 in the IMAP configuration file, which is typically located in /usr/lib /courier-imap/etc/imapd.

2nd Failure:

Protocol: TCP | Port: 465 | Program: urd | Score: 5.0

Summary:

Description: SSL Certificate Expiry Synoposis: The remote server's SSL certificate has already expired.

Impact: This script checks expiry dates of certificates associated with SSL- enabled services on the target and reports whether any have already expired.

Resolution: Purchase or generate a new SSL certificate to replace the existing one.

3rd Failure:

Protocol: TCP | Port: 3306 | Program: N/A | Score: 4.0

Summary:

Title: Open MySQL database port Synoposis: An open MySQL database port was detected Impact: Open MySQL database port

Resolution: Disable public facing access to your MySQL database If you feel that you have received this notice in error, please contact SecurityMetrics support.

4th Failure:

Protocol: TCP | Port: 3306 | Program: N/A | Score: 4.0

Summary:

Title: Possible internet facing database on port 3306 Impact: Attackers could gain access to the database.

Resolution: Ensure that you absolutely need this available to the internet, or that the service is not available over the internet. Make sure the software is up to date.
---------------------------------------

Many thanks in advance to anyone who can help :)
 
Well I managed to sort all problems apart from the Courier IMAP one which I believe is a false positive anyway.

For the expired SSL I simply created a new self-signed one and replaced it. And for the accessible port 3306, I simply blocked access using the firewall.

I have checked and the server is running courier-imap version 3.0.8 (which is higher than required), also DEBUG_LOGIN=0 is already enabled in the imapd file. I ran the following commands:

yum list installed | grep courier-imap
grep DEBUG_LOGIN /etc/courier-imap/imapd

and have sent the log file to SecurityMetrics to prove they are flagging a false-positive. Hopefully they will override the failed scan.

In reply to IgorG:

I believe I have already applied all recommendations at http://download1.parallels.com/Plesk/PP10/10.4/Doc/en-US/online/plesk-pci-compliance-guide/ sometime in the past (also I don't see any fixes which would help me with the above failings).

I haven't upgraded plesk as I was slightly worried it would overwrite previous adjustments I had made for PCI compliance on the server. I will upgrade once this scan is passed.
 
Back
Top