December 7, 2017 By Larry Loeb 2 min read

A European security researcher recently discovered that current implementations of the RFC-1342 standard, which was created in 1992 to encode non-ASCII characters inside email headers, may have security vulnerabilities that enable fraudsters to commit spoofing and code injection attacks.

These flaws allow spoofers to circumvent Domain-Based Message Authentication, Reporting and Conformance (DMARC), an antispoofing authentication protocol introduced in 2015, as well as spam filters, the researcher, Sabri Haddouche, wrote in a blog post.

Poking Holes in RFC-1342

RFC-1342 converts non-ASCII characters in mail headers to standard ASCII characters, which is required by most email servers. But Haddouche discovered that some email services would take an RFC-1342-encoded string and decode it without checking for objectionable code that could be embedded in the string.

Due to the way email clients display sender addresses, DMARC would then evaluate the DomainKeys Identified Mail (DKIM) signature of the original domain as correct. This makes phishing emails and their improbable addresses harder for defenders to spot.

Additionally, Haddouche noted that if the decoded email string contained a null byte or multiple email addresses, things went haywire. The client would read only the email address before the null byte or the first valid email found and ignore the rest of the encoded string. An attacker could fool an email client by generating a non-ASCII string to serve as a sender address with these properties.

Addressing Security Vulnerabilities in Email Clients

Haddouche compiled a list of vulnerable email clients, which includes clients for all major consumer operating systems. Although he contacted all 33 affected vendors, Bleeping Computer reported than only eight have released patches to fix the problem. Haddouche noted that Mozilla and Opera said they won’t address the bug because they consider it to be a server-side issue.

IT professionals must consider the security of the email systems they use in the enterprise. To address this specific threat, security teams may need to contact affected vendors to reach a resolution.

More from

How to craft a comprehensive data cleanliness policy

3 min read - Practicing good data hygiene is critical for today’s businesses. With everything from operational efficiency to cybersecurity readiness relying on the integrity of stored data, having confidence in your organization’s data cleanliness policy is essential.But what does this involve, and how can you ensure your data cleanliness policy checks the right boxes? Luckily, there are practical steps you can follow to ensure data accuracy while mitigating the security and compliance risks that come with poor data hygiene.Understanding the 6 dimensions of…

2024 roundup: Top data breach stories and industry trends

3 min read - With 2025 on the horizon, it’s important to reflect on the developments and various setbacks that happened in cybersecurity this past year. While there have been many improvements in security technologies and growing awareness of emerging cybersecurity threats, 2024 was also a hard reminder that the ongoing fight against cyber criminals is far from over.We've summarized this past year's top five data breach stories and industry trends, with key takeaways from each that organizations should note going into the following…

Black Friday chaos: The return of Gozi malware

4 min read - On November 29th, 2024, Black Friday, shoppers flooded online stores to grab the best deals of the year. But while consumers were busy filling their carts, cyber criminals were also seizing the opportunity to exploit the shopping frenzy. Our system detected a significant surge in Gozi malware activity, targeting financial institutions across North America. The Black Friday connection Black Friday creates an ideal environment for cyber criminals to thrive. The combination of skyrocketing transaction volumes, a surge in online activity…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today