[35393] in bugtraq

home help back first fref pref prev next nref lref last post

Re: Is predictable spam filtering a vulnerability?

daemon@ATHENA.MIT.EDU (Sean Straw / PSE)
Sun Jun 20 12:34:07 2004

X-Envelope-From: PSE-L@mail.professional.org
X-Envelope-To: <bugtraq@securityfocus.com>
Message-Id: <5.1.1.6.2.20040618114102.08ec5330@mail.professional.org>
Date: Fri, 18 Jun 2004 11:52:01 -0700
To: bugtraq@securityfocus.com
From: PSE-L@mail.professional.org (Sean Straw / PSE)
In-Reply-To: <20040617172700.GA21370@eip.bitnux.com>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"; format=flowed

At 19:27 2004-06-17 +0200, Joel Eriksson wrote:
>On Wed, Jun 16, 2004 at 01:26:28PM +0200, R Armiento wrote:
>[snip]
> > For example: attacker 'A' sends 'B' a social engineering request
> > for "the secret plans" and says "if you are unsure, forward my
> > request to your boss and ask if this is okay". 'B' forwards the
> > email to his boss 'C' and asks "Is this okay?". However, 'C':s
> > spam filter silently drops the email. 'A' forges a reply from
> > 'C' saying: "Sure, no problem, go ahead."
>
>Many will probably discard the above as farfetched or ignore it
>since it's not a "real" vulnerability that gives remote root to
>the attacker, I think it's beautiful though. :)

A far more plausible vulnerability would be for the attacker, if they had 
exploited the mail and/or DNS hosts used by user B to intercept or redirect 
mail.  This would significantly increase the workability of further 
socially engineered exploits.

FTR, the proposed failing wouldn't be possible if such decisions were 
digitally signed (PGP/GNUPG, etc) - the "forged" email would fail to be 
verified.

The success of the supposed mail vulnerability relies upon the gullibility 
of user B, not upon an automated system.  There are other factors to 
consider in there as well, such as SPF filtering at the mailhost of user B 
(which could reject the forged mail because the originating mailserver 
isn't correct for the sending address), or of user B sending a response to 
the forged authorization, and THAT message going unresponded to, or at 
least of user A (attacker) not RECEIVING that message to know to respond to 
it.  For that matter, it relies upon the message from user B to user C not 
including other details which user A would fail to address when sending the 
forged reply, and that user B doesn't simply pick up the phone and call 
user C, which renders the whole matter moot.

---
  Please DO NOT carbon me on list replies.  I'll get my copy from the list.

  Sean B. Straw / Professional Software Engineering
  Post Box 2395 / San Rafael, CA  94912-2395


home help back first fref pref prev next nref lref last post