Am 01.01.2024 um 17:58:47 Uhr schrieb Gellner, Oliver via mailop:

> The vulnerability is not super critical, but it has been fixed only
> for a very small subset of affected systems. All kind of MTAs from
> Postfix to Sendmail, Exim and various proprietary systems are
> affected and the vulnerability generally remains unfixed until the
> administrators adjust the configuration of their system.

IIRC it can only be exploited if 2 MTAs at one site treat CRLF and LF
differently.
If all MTAs handle it the same way, it is not possible to abuse it.

Another situation could occur if one MTA (MX) accepts an message and
ignores LF, then forwards it to another external one (vacation,
aliases) that treats LF.LF as the DATA ending.
That could be used to allow unauthenticated relaying too, although the
recipients are limited to the MX servers of the RHS of the
alias/forward.
It can also be used to create bounces in that case.

At least for sendmail, a fix is available in the current snapshot,
but the fix is just an additional feature (srv_features) that changes it
it, so it only accepts CRLF.
_______________________________________________
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop

Reply via email to