Bug #283

Mailsploit.com exploits pack vulnerability

Added by Igor Nedoboy 5 months ago. Updated 5 months ago.

Status:RejectedStart date:12/06/2017
Priority:HighDue date:
Assignee:Hiroyuki Yamamoto% Done:

0%

Category:SecuritySpent time:-
Target version:3.6

Description

Hello dear mr. Yamamoto,

recently I see related issue on K-9 Mail tracker, https://github.com/k9mail/k-9/issues/2962.
Seems that Sylpheed have some problems. Please take a look on the screenshot attached.

3.5 & 3.6 Linux versions are tested.

scr.png (73.2 KB) Igor Nedoboy, 12/06/2017 08:27 AM

mailsploit-test.png (101 KB) Hiroyuki Yamamoto, 12/08/2017 09:51 AM

History

#1 Updated by Hiroyuki Yamamoto 5 months ago

I have just chedked that, and I can say that Sylpheed is NOT exploitable by this exploits.
If you open the messages, you can easily detect the spoofing by looking From (see the attached screenshot),
not like the example on the page: https://www.mailsploit.com/index

Sylpheed just ignores or replaces the Q-encoded nul character or newline (=?utf-8?Q?=00?=) (=?utf-8?Q?=0A=00?=),
so the actual domain part will not be hidden.

The From column of the summary view only displays display-name part,
so you shouldn't judge only by the information.

#2 Updated by Igor Nedoboy 5 months ago

Dear Mr. Yamamoto, thank you very much.

Sorry for wrong issue.

Kind Regards.

Also available in: Atom PDF