lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <609332641-1093394240-cardhu_blackberry.rim.net-2355-@engine69>
Date: Wed, 25 Aug 2004 00:34:55 +0000 GMT
From: "Jason Coombs PivX Solutions" <jcoombs@...X.com>
To: "CHRIS GRABENSTEIN" <CGRABENSTEIN@...c.edu>
Cc: bugtraq@...urityfocus.com
Subject: Re: Images being pulled in Outlook 2003 even though don't download pictures is set?


The recent LIBPNG vulnerability can be exploited by sending HTML e-mail containing an embedded malicious PNG image referenced locally using cid: as well, if the recipient of the e-mail is using a vulnerable mail client. See

Chris Evans' security advisory
http://scary.beasts.org/security/CESA-2004-001.txt

Therefore this issue is somewhat serious, and deserves more attention. Mail clients need to block automatic display of all images, not just those referenced by external URL inside an img tag. It is a lot of work to locate vulnerable binary code, notify vendors of vulnerable or flawed products and teach them this remedial basic security principle. I am looking for volunteers who are interested in helping out with this effort.

Does anyone have a list of closed-source products known to contain LIBPNG or code derived from it that is believed vulnerable?

Most Secure Regards,

Jason Coombs
Director of Forensic Services
PivX Solutions, Inc.
Jcoombs@...X.com

-----Original Message-----
From: "CHRIS GRABENSTEIN" <CGRABENSTEIN@...c.edu>
Date: Mon, 23 Aug 2004 15:20:39 
To:<security-basics@...urityfocus.com>
Subject: RE: Images being pulled in Outlook 2003 even though don't download pictures is set?

The reference after cid: refers to an image embedded in the email itself.
The image arrives as part of the email rather than being pulled from a remote
server.

-----Original Message-----
From: Spencer, Mark [mailto:mspencer@...dentdata.com] 
Sent: Sunday, August 22, 2004 12:36 PM
To: security-basics@...urityfocus.com
Subject: Images being pulled in Outlook 2003 even though don't download
pictures is set?

I've been getting lots of spam with images being displayed, even though my
Outlook 2003 is set to not download pictures automatically.  Here's what I
think is the relevant code (minus < and >):

DIV align=center
FONT face=Arial size=2
IMG src="cid:kfhyepds_bfjhwcxn_dkiaarqo"
/FONT
/DIV
/BODY
/HTML

Any advice on how to deal with this?  How does that "cid: .." translate into
a legitimate IP address from which to pull an image?

Thanks!

---------------------------------------------------------------------------
Computer Forensics Training at the InfoSec Institute. All of our class sizes
are guaranteed to be 12 students or less to facilitate one-on-one interaction
with one of our expert instructors. Gain the in-demand skills of a certified
computer examiner, learn to recover trace data left behind by fraud, theft,
and cybercrime perpetrators. Discover the source of computer crime and abuse
so that it never happens again.

http://www.securityfocus.com/sponsor/InfoSecInstitute_security-basics_040817
----------------------------------------------------------------------------


---------------------------------------------------------------------------
Computer Forensics Training at the InfoSec Institute. All of our class sizes
are guaranteed to be 12 students or less to facilitate one-on-one
interaction with one of our expert instructors. Gain the in-demand skills of
a certified computer examiner, learn to recover trace data left behind by
fraud, theft, and cybercrime perpetrators. Discover the source of computer
crime and abuse so that it never happens again.

http://www.infosecinstitute.com/courses/computer_forensics_training.html
----------------------------------------------------------------------------

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ