On Wed, Jan 27, 2016 at 10:54:50AM -0800, Louis Kowolowski wrote:

> I found an interesting email that got caught in my spam quarantine. I�m
> wondering if postfix is vulnerable to this kind of code execution (I�m
> aware that other components could be vulnerable, but this question is
> specifically targeting postfix).

Postfix does not inject message headers into the environment and
is not itself vulnerable to the shellshock Bash attack nor does
Postfix directly expose delivery programs to the attack.

The local(8) delivery agent does export some envelope data into
the environment of delivery scripts, but these are sanitised:

       A  limited  amount of message context is exported via environment vari‐
       ables. Characters that may  have  special  meaning  to  the  shell  are
       replaced  by  underscores.  The list of acceptable characters is speci‐
       fied with the command_expansion_filter configuration parameter.

See local(8) for details.

Users who write pipe(8) processing programs can of course eval the
message as a shell script if they are so determined, we can't stop
them from doing that.

-- 
        Viktor.

Reply via email to