On 12/6/2017 7:52 AM, Jan-Pieter Cornet wrote:
None of the mailsploit exploits target \n chars. I wouldn't worry about those. My implementation only matches \0 chars. You don't need [] around the char. Or you could write /\000/ as a full octal charcode.
From my research this morning, the exploit in general is the inclusion of control codes by using encoding of base64 and utf8 to bypass rfc sanity checks.  The specific examples he used show improper MUA parsing of the \0 but it's unknown what some MUAs will do with control codes in these fields.

So the [] was written because I expect other control codes to be brought up to also block.  And originally I was trying to block \n but of course a header has to have just one \n.
One of the mailsploit tests that I currently don't deal with encode an email address in the username part of the sender. I should block those too...
Yeah, I haven't looked at the exploits he's published before.  Any technical details on that one?

Regards,
KAM
_______________________________________________
NOTE: If there is a disclaimer or other legal boilerplate in the above
message, it is NULL AND VOID.  You may ignore it.

Visit http://www.mimedefang.org and http://www.roaringpenguin.com
MIMEDefang mailing list [email protected]
http://lists.roaringpenguin.com/mailman/listinfo/mimedefang

Reply via email to