Re: Test mail

Paul Mundt (lethal@ChaoticDreams.ORG)
Mon, 30 Jul 2001 05:23:02 -0700


On Mon, Jul 30, 2001 at 01:15:21PM +0100, Alan Cox wrote:
> > > ELM, Pine and Mutt have all at various times had holes that could have been
> > > used to write an exact Unix equivalent of the windows virus.
> > > <img src="file:/dev/mouse"> hangs some web browser email 4 years after the
> > > bug was reported and so on...
> > >
> > This all goes back to opening things blindly, and also ties in the issue of
> > HTML aware email clients.
>
> Most exploits are header parsing flaws, HTML email is irrelevant to this
> discussion.
>
Parsing an <img> tag certainly seems to make HTML email relevant...

> > Mail clients should simply be dealing with plain text. As soon as things like
> > HTML support are introduced into the client, you have the same sort of
> > problems that you do with easily exploitable web browsers.
>
> No. Most of them are header parsing flaws, they worked with plain text
> email just fine. In fact HTML parsing vulnerabilities (other than privacy
> violations) are pretty rare.
>
There are far fewer header parsing exploits floating around then there are
users executing things of an unknown origin and unknowingly sending copies of
said thing to everyone in their address book.

While header parsing exploits are indeed an issue, they hardly make up the
bulk of these sort of exploits.

Things like Elm, Pine, and Mutt can be as exploitable as anything else as far
as header parsing issues are concerned. They still account for far less
of the problems than things like Outlook do.

Regards,

-- 
Paul Mundt <lethal@chaoticdreams.org>

- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/