On Thu, 26 Jun 2014, [email protected] wrote:
From: Jamie <[email protected]>

deny message = Blacklisted file extension detected
   condition = ${if match \
                    {${lc:$mime_filename}} \
                    {\N(\.exe|\.pif|\.bat|\.scr|\.lnk|\.com|\.zip)$\N} \
                 {1}{0}}

It has hugely reduced the amount of spam, but they have suddenly worked
around it by sending documents with an attachment name of "& # 1057 ;
opy_of_document_SER176.zip" (without spaces)

How the full header of the MIME part looks undecoded?  Use the
"view source" function of your MUA, like perhaps Ctrl-U in Thunderbird,
e in Mutt, Ctrl-F3 in Outlook Express. Base64-encoded filenames
like this example should be decoded correctly:

It appears the RFC2047 decode in Exim can be tricked, and the spammers
have figured out how to exploit it.

For example, this is a recent MIME part (I added "_")

   Content-Type: application/x-zip-compressed;
        name="&_#_1057_;opy_of_Document_ID7851.zip"
   Content-Transfer-Encoding: base64
   Content-Disposition: attachment;
        filename="&_#_1057_;opy_of_Document_ID7851.zip"

When Exim expands the variable $mime_filename the result
is only "&_#_1057" and nothing else (again _'s added)


--
## List details at https://lists.exim.org/mailman/listinfo/exim-users
## Exim details at http://www.exim.org/
## Please use the Wiki with this list - http://wiki.exim.org/

Reply via email to