December 7, 2017 By Larry Loeb 2 min read

A European security researcher recently discovered that current implementations of the RFC-1342 standard, which was created in 1992 to encode non-ASCII characters inside email headers, may have security vulnerabilities that enable fraudsters to commit spoofing and code injection attacks.

These flaws allow spoofers to circumvent Domain-Based Message Authentication, Reporting and Conformance (DMARC), an antispoofing authentication protocol introduced in 2015, as well as spam filters, the researcher, Sabri Haddouche, wrote in a blog post.

Poking Holes in RFC-1342

RFC-1342 converts non-ASCII characters in mail headers to standard ASCII characters, which is required by most email servers. But Haddouche discovered that some email services would take an RFC-1342-encoded string and decode it without checking for objectionable code that could be embedded in the string.

Due to the way email clients display sender addresses, DMARC would then evaluate the DomainKeys Identified Mail (DKIM) signature of the original domain as correct. This makes phishing emails and their improbable addresses harder for defenders to spot.

Additionally, Haddouche noted that if the decoded email string contained a null byte or multiple email addresses, things went haywire. The client would read only the email address before the null byte or the first valid email found and ignore the rest of the encoded string. An attacker could fool an email client by generating a non-ASCII string to serve as a sender address with these properties.

Addressing Security Vulnerabilities in Email Clients

Haddouche compiled a list of vulnerable email clients, which includes clients for all major consumer operating systems. Although he contacted all 33 affected vendors, Bleeping Computer reported than only eight have released patches to fix the problem. Haddouche noted that Mozilla and Opera said they won’t address the bug because they consider it to be a server-side issue.

IT professionals must consider the security of the email systems they use in the enterprise. To address this specific threat, security teams may need to contact affected vendors to reach a resolution.

More from

Airplane cybersecurity: Past, present, future

4 min read - With most aviation processes now digitized, airlines and the aviation industry as a whole must prioritize cybersecurity. If a cyber criminal launches an attack that affects a system involved in aviation — either an airline’s system or a third-party vendor — the entire process, from safety to passenger comfort, may be impacted.To improve security in the aviation industry, the FAA recently proposed new rules to tighten cybersecurity on airplanes. These rules would “protect the equipment, systems and networks of transport…

Protecting your digital assets from non-human identity attacks

4 min read - Untethered data accessibility and workflow automation are now foundational elements of most digital infrastructures. With the right applications and protocols in place, businesses no longer need to feel restricted by their lack of manpower or technical capabilities — machines are now filling those gaps.The use of non-human identities (NHIs) to power business-critical applications — especially those used in cloud computing environments or when facilitating service-to-service connections — has opened the doors for seamless operational efficiency. Unfortunately, these doors aren’t the…

Communication platforms play a major role in data breach risks

4 min read - Every online activity or task brings at least some level of cybersecurity risk, but some have more risk than others. Kiteworks Sensitive Content Communications Report found that this is especially true when it comes to using communication tools.When it comes to cybersecurity, communicating means more than just talking to another person; it includes any activity where you are transferring data from one point online to another. Companies use a wide range of different types of tools to communicate, including email,…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today