December 7, 2017 By Larry Loeb 2 min read

A European security researcher recently discovered that current implementations of the RFC-1342 standard, which was created in 1992 to encode non-ASCII characters inside email headers, may have security vulnerabilities that enable fraudsters to commit spoofing and code injection attacks.

These flaws allow spoofers to circumvent Domain-Based Message Authentication, Reporting and Conformance (DMARC), an antispoofing authentication protocol introduced in 2015, as well as spam filters, the researcher, Sabri Haddouche, wrote in a blog post.

Poking Holes in RFC-1342

RFC-1342 converts non-ASCII characters in mail headers to standard ASCII characters, which is required by most email servers. But Haddouche discovered that some email services would take an RFC-1342-encoded string and decode it without checking for objectionable code that could be embedded in the string.

Due to the way email clients display sender addresses, DMARC would then evaluate the DomainKeys Identified Mail (DKIM) signature of the original domain as correct. This makes phishing emails and their improbable addresses harder for defenders to spot.

Additionally, Haddouche noted that if the decoded email string contained a null byte or multiple email addresses, things went haywire. The client would read only the email address before the null byte or the first valid email found and ignore the rest of the encoded string. An attacker could fool an email client by generating a non-ASCII string to serve as a sender address with these properties.

Addressing Security Vulnerabilities in Email Clients

Haddouche compiled a list of vulnerable email clients, which includes clients for all major consumer operating systems. Although he contacted all 33 affected vendors, Bleeping Computer reported than only eight have released patches to fix the problem. Haddouche noted that Mozilla and Opera said they won’t address the bug because they consider it to be a server-side issue.

IT professionals must consider the security of the email systems they use in the enterprise. To address this specific threat, security teams may need to contact affected vendors to reach a resolution.

More from

Access control is going mobile — Is this the way forward?

2 min read - Last year, the highest volume of cyberattacks (30%) started in the same way: a cyber criminal using valid credentials to gain access. Even more concerning, the X-Force Threat Intelligence Index 2024 found that this method of attack increased by 71% from 2022. Researchers also discovered a 266% increase in infostealers to obtain credentials to use in an attack. Family members of privileged users are also sometimes victims.“These shifts suggest that threat actors have revalued credentials as a reliable and preferred…

FYSA – Critical RCE Flaw in GNU-Linux Systems

2 min read - Summary The first of a series of blog posts has been published detailing a vulnerability in the Common Unix Printing System (CUPS), which purportedly allows attackers to gain remote access to UNIX-based systems. The vulnerability, which affects various UNIX-based operating systems, can be exploited by sending a specially crafted HTTP request to the CUPS service. Threat Topography Threat Type: Remote code execution vulnerability in CUPS service Industries Impacted: UNIX-based systems across various industries, including but not limited to, finance, healthcare,…

Ransomware on the rise: Healthcare industry attack trends 2024

4 min read - According to the IBM Cost of a Data Breach Report 2024, the global average cost of a data breach reached $4.88 million this year, a 10% increase over 2023.For the healthcare industry, the report offers both good and bad news. The good news is that average data breach costs fell by 10.6% this year. The bad news is that for the 14th year in a row, healthcare tops the list with the most expensive breach recoveries, coming in at $9.77…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today