Project

General

Profile

Bug #283

Mailsploit.com exploits pack vulnerability

Added by Igor Nedoboy almost 5 years ago. Updated almost 5 years ago.

Status:
Rejected
Priority:
High
Category:
Security
Target version:
Start date:
12/06/2017
Due date:
% Done:

0%

Estimated time:

Description

Hello dear mr. Yamamoto,

recently I see related issue on K-9 Mail tracker, https://github.com/k9mail/k-9/issues/2962.
Seems that Sylpheed have some problems. Please take a look on the screenshot attached.

3.5 & 3.6 Linux versions are tested.


Files

scr.png (73.2 KB) scr.png Igor Nedoboy, 12/06/2017 08:27 AM
mailsploit-test.png (101 KB) mailsploit-test.png Hiroyuki Yamamoto, 12/08/2017 09:51 AM
#1

Updated by Hiroyuki Yamamoto almost 5 years ago

I have just chedked that, and I can say that Sylpheed is NOT exploitable by this exploits.
If you open the messages, you can easily detect the spoofing by looking From (see the attached screenshot),
not like the example on the page: https://www.mailsploit.com/index

Sylpheed just ignores or replaces the Q-encoded nul character or newline (=?utf-8?Q?=00?=) (=?utf-8?Q?=0A=00?=),
so the actual domain part will not be hidden.

The From column of the summary view only displays display-name part,
so you shouldn't judge only by the information.

#2

Updated by Igor Nedoboy almost 5 years ago

Dear Mr. Yamamoto, thank you very much.

Sorry for wrong issue.

Kind Regards.

Also available in: Atom PDF