https://bz.apache.org/SpamAssassin/show_bug.cgi?id=6439

--- Comment #8 from Bill Cole <billc...@apache.org> ---
(In reply to Kent Oyer from comment #7)
> Thanks for the quick response. I do have a real-world mail flow where I'm
> seeing this being exploited dozens of times per day. As far as a spec goes,
> I would recommend processing any application/octet-stream parts as text if
> the filename extension is html, htm, or shtml (case-insensitive). It might
> be wise to include other extensions such as xhtml but I'm not seeing that
> being exploited. 

Seems to me that .txt also needs to be there. 

> Since there's no point in producing a patch for version 3, I'll try to solve
> my problem with ClamAV. Unfortunately there are legitimate senders that also
> use application/octet-stream to send HTML attachments so the only way to
> detect malicious intent is to examine the attachment contents. 
> 
> I can provide sanitized examples if that helps.

That would be helpful.

-- 
You are receiving this mail because:
You are the assignee for the bug.

Reply via email to