> -----Original Message-----
> From: Craig Hughes [mailto:[EMAIL PROTECTED]]
> 
> On Mon, 2002-02-04 at 00:07, Jeremy Zawodny wrote:
>     > The docs are right that this is probably a security flaw.
>     
>     What's the flaw?  As long as we're not doing "use re 
> 'eval'" in the
>     code, of course.
>     
> The relevant line of code is this:
> 
>     if ($addr =~ /$regexp/i) { return 1; }
> 
> where $regexp is the thing we read from (possibly user's) config file.
> 
> Since it's interpolating the contents of $regexp, could not someone
> construct something nefarious to put in there.  Certainly a savvy perl
> user could construct a regexp that takes forever to evaluate 
> and thereby
> launch a DOS attack.  I don't know enough perl to think of 
> worse things,
> but I'm sure there are worse things.

Not much of a DoS attack to launch it against your own email server, and
leave the trace in your own user file ;-)

However you can probably execute some sort of perl code in there, which is a
risk if you're running as root.

Matt.

________________________________________________________________________
This e-mail has been scanned for all viruses by Star Internet. The
service is powered by MessageLabs. For more information on a proactive
anti-virus service working around the clock, around the globe, visit:
http://www.star.net.uk
________________________________________________________________________

_______________________________________________
Spamassassin-talk mailing list
[EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/spamassassin-talk

Reply via email to