Package: ruby-mail
Severity: important
Tags: upstream fixed-upstream security

Rubysec advisory [1]: "Because the Mail Gem for Ruby does not validate or
impose a length limit on email address fields, an attacker can modify
messages sent with the gem via a specially-crafted recipient email
address.

Applications that validate email address format are not affected by this
vulnerability.

The recipient attack is described in Terada, Takeshi. "SMTP Injection
via Recipient Email Addresses." 2015. The attacks described in the paper
(Terada, p. 4) can be applied to the library without any modification."

Upstream fix targeting 2.5 [2]; upstream fix targeting 2.6 [3].

[1] https://rubysec.com/advisories/mail-OSVDB-131677
[2] https://github.com/mikel/mail/pull/1099
[3] https://github.com/mikel/mail/pull/1098

Attachment: signature.asc
Description: Digital signature

_______________________________________________
Pkg-ruby-extras-maintainers mailing list
Pkg-ruby-extras-maintainers@lists.alioth.debian.org
http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/pkg-ruby-extras-maintainers

Reply via email to