> -----Original Message----- > From: Craig Hughes [mailto:[EMAIL PROTECTED]] > > On Mon, 2002-02-04 at 00:07, Jeremy Zawodny wrote: > > The docs are right that this is probably a security flaw. > > What's the flaw? As long as we're not doing "use re > 'eval'" in the > code, of course. > > The relevant line of code is this: > > if ($addr =~ /$regexp/i) { return 1; } > > where $regexp is the thing we read from (possibly user's) config file. > > Since it's interpolating the contents of $regexp, could not someone > construct something nefarious to put in there. Certainly a savvy perl > user could construct a regexp that takes forever to evaluate > and thereby > launch a DOS attack. I don't know enough perl to think of > worse things, > but I'm sure there are worse things.
Not much of a DoS attack to launch it against your own email server, and leave the trace in your own user file ;-) However you can probably execute some sort of perl code in there, which is a risk if you're running as root. Matt. ________________________________________________________________________ This e-mail has been scanned for all viruses by Star Internet. The service is powered by MessageLabs. For more information on a proactive anti-virus service working around the clock, around the globe, visit: http://www.star.net.uk ________________________________________________________________________ _______________________________________________ Spamassassin-talk mailing list [EMAIL PROTECTED] https://lists.sourceforge.net/lists/listinfo/spamassassin-talk