> 
> I wouldn't necessarily call this a vulnerability.  I ran into
> this when writting the Regex Scanner for QSQ.  Find 
> $skip_text_msgs and set it to 0 so that all e-mails, 
> including plain text, are scanned.
> 
> This only applies to the 1.2x versions, 1.1x don't have this feature.
> 

You don't call this a vuilnerability???  What happens when the next
virus outbreak comes in as inline uuencoded attachments  instead of a
jpeg like in my example and QS doesn't run virus scans on them because
the message is plain text?    Reformime wont even blow these messages
apart...

[EMAIL PROTECTED] tmp]# reformime -i < msg1
section: 1
content-type: text/plain
content-transfer-encoding: 8bit
charset: iso-8859-1
starting-pos: 0
starting-pos-body: 771
ending-pos: 103899
line-count: 1693
body-line-count: 1677

So perlscanner will not help you when you try and block .pif or .exe
that are embedded inline...

I did not try ripmime to see if it pulls the inline uuencoding.

I know how to fix the damn thing..  But I really don't care at this
point because like I said, I don't use it yet.   I guess I just like to
look at code before throwing it onto something.

I just want everyone else to know that this is a problem with Q-S that
needs to be addressed before it is used in production environment.

Dallas




-------------------------------------------------------
This SF.Net email is sponsored by: IBM Linux Tutorials
Free Linux tutorial presented by Daniel Robbins, President and CEO of
GenToo technologies. Learn everything from fundamentals to system
administration.http://ads.osdn.com/?ad_id70&alloc_id638&op=click
_______________________________________________
Qmail-scanner-general mailing list
[EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/qmail-scanner-general

Reply via email to