Hi all,

I've noticed that I've had a few spams recently where the To: field
includes a DOS-style file path - some examples are:

To: <C:\`Bulk.Adz\MTG\[EMAIL PROTECTED]>
To: <C:\`Commercial.Adz\Mtg\[EMAIL PROTECTED]>
To: <C:\``VipCustomer\`Euro\[EMAIL PROTECTED]>
To: <C:\``VipCustomer\Yen\[EMAIL PROTECTED]>
To: <C:\``VipCustomer\Dvd\[EMAIL PROTECTED]>

Is anyone else seeing these?

A rule to spot them is trivial, but will have to wait till after 2.50.

header L_TO_FILENAME            To =~ /^<C:\\/
describe L_TO_FILENAME          "To" header contains a filename
score L_TO_FILENAME             1.0

I'll file a bug in the Bugzilla for this in due course.

It's possible these are generated by the same software - all the
messages I've had also include the following headers:

Content-Type: text/plain;
        charset="Windows-1252"
Content-Transfer-Encoding: 7bit

Martin
-- 
Martin Radford              |   "Only wimps use tape backup: _real_ 
[EMAIL PROTECTED] | men just upload their important stuff  -o)
Registered Linux user #9257 |  on ftp and let the rest of the world  /\\
- see http://counter.li.org |       mirror it ;)"  - Linus Torvalds _\_V


-------------------------------------------------------
This sf.net email is sponsored by:ThinkGeek
Welcome to geek heaven.
http://thinkgeek.com/sf
_______________________________________________
Spamassassin-talk mailing list
[EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/spamassassin-talk

Reply via email to