|
|
Subscribe / Log in / New account

Security

Mail filtering in Thunderbird 1.5

Your editor recently had a chance to try out the second beta Thunderbird 1.5 release. There are a number of nice additions in this release of Mozilla's mail client - and a few not-so-nice subtractions, in the form of broken extensions. This article will concentrate on a couple of security-related features.

Thunderbird has had spam filtering for some time. Your editor has never given it a full test, however. Happily, an ideal resource exists for this purpose: your editor's 4000-spam-per-day mail stream. A quick config file tweak directed a copy of this stream, unfiltered, into Thunderbird to see how it would react.

The bayesian filter built into Thunderbird turns out to be a quick learner. After 100 messages or so, it was busily marking most messages itself. The speed with which it learns tempts the user to turn on automatic spam-canning of marked mail early in the process; it is such a delight to see that stuff simply disappear. Training a SpamAssassin filter takes quite a bit longer.

Unfortunately, the Thunderbird filter appears to learn too quickly, with the result that false positives become a problem. As long as Thunderbird is not configured to automatically refile spam, the false positives can be corrected with, one assumes, an appropriate tweaking of the filter. Once spams have been diverted, however, there appears to be no way to tell Thunderbird that it made a mistake. So new Thunderbird users would be well advised to look over its spam classification decisions for some time before empowering it to refile mail automatically.

SpamAssassin's more conservative approach may well turn out to be better for people who cannot afford to lose mail. Happily, Thunderbird 1.5 includes an option which causes it to defer to SpamAssassin on filtering. Thus, the system administrator can use SpamAssassin to add headers to mail, and individual users can have Thunderbird act on those headers if desired.

A truly new feature in 1.5 is phishing detection. A few simple rules have been added to detect phishy links; essentially, a message will be flagged if a URL contains a numeric IP address or the link text contains an address which fails to match the link destination. In these cases, clicking on a suspect link will result in a dialog explaining the situation and asking if the user wishes to proceed. Thunderbird will also mark such messages with a line saying "Mail/News thinks this message might be an email scam."

This capability is a step in the right direction, but it has some obvious shortcomings. It failed to detect a number of random phishes found in your editor's mailbox. The "this might be junk" message also overrides the phishing warning; arguably the scam warning should take priority. The real risk, though, is that users might think that, if Thunderbird does not flag a message, it must be legitimate. Remember, these are people who fall for phishing scams in the first place.

The best way to avoid that possibility would be to improve the detection of phishing messages. One wonders if the bayesian filter could be trained to this purpose as well as detecting spam. There is also ample opportunity for cooperation with anti-phishing groups which maintain lists of known phishing sites - though one would have to be careful to preserve a user's privacy when checking links.

Quibbles aside, Thunderbird 1.5 is a step in the right direction toward a more secure email environment. More work clearly remains to be done - but that is likely to always be the case. Meanwhile, tools which help to reduce the spam and phishing problems can only be a good thing.

Comments (8 posted)

New vulnerabilities

graphviz: insecure temporary file

Package(s):graphviz CVE #(s):CAN-2005-2965
Created:October 10, 2005 Updated:October 21, 2005
Description: Javier Fernández-Sanguino Peña discovered insecure temporary file creation in graphviz, a rich set of graph drawing tools, that can be exploited to overwrite arbitrary files by a local attacker.
Alerts:
Mandriva MDKSA-2005:188 graphviz 2005-10-20
Ubuntu USN-208-1 graphviz 2005-10-17
Debian DSA-857-1 graphviz 2005-10-10

Comments (none posted)

kernel: multiple vulnerabilities

Package(s):linux-source-2.6.10, linux-source-2.6.8.1 CVE #(s):CAN-2005-3053 CAN-2005-3106 CAN-2005-3107 CAN-2005-3108 CAN-2005-3109 CAN-2005-3110
Created:October 10, 2005 Updated:October 27, 2005
Description: A Denial of Service vulnerability was discovered in the sys_set_mempolicy() function. By calling the function with a negative first argument, a local attacker could cause a kernel crash. (CAN-2005-3053)

A race condition was discovered in the handling of shared memory mappings with CLONE_VM. A local attacker could exploit this to cause a deadlock (Denial of Service) by triggering a core dump while waiting for a thread which had just performed an exec() system call. (CAN-2005-3106)

A race condition was found in the handling of traced processes. When one thread was tracing another thread that shared the same memory map, a local attacker could trigger a deadlock (Denial of Service) by forcing a core dump when the traced thread was in the TASK_TRACED state. (CAN-2005-3107)

A vulnerability has been found in the "ioremap" module. By performing certain IO mapping operations, a local attacker could either read memory pages he has not normally access to (information leak) or cause a kernel crash (Denial of Service). This only affects the amd64 platform. (CAN-2005-3108)

The HFS and HFS+ file system drivers did not properly verify that the file system that was attempted to be mounted really was HFS/HFS+. On machines which allow users to mount arbitrary removable devices as HFS or HFS+ with an /etc/fstab entry, this could be exploited to trigger a kernel crash. (CAN-2005-3109)

Steve Herrel discovered a race condition in the "ebtables" netfilter module. A remote attacker could exploit this by sending specially crafted packets that caused a value to be modified after it had been read but before it had been locked. This eventually lead to a kernel crash. This only affects multiprocessor machines (SMP). (CAN-2005-3110)

Alerts:
Red Hat RHSA-2005:808-01 kernel 2005-10-27
Trustix TSLSA-2005-0057 cups kernel openssl 2005-10-14
Ubuntu USN-199-1 linux-source-2.6.10, linux-source-2.6.8.1 2005-10-10

Comments (none posted)

koffice: KWord RTF import buffer overflow

Package(s):koffice CVE #(s):CAN-2005-2971
Created:October 12, 2005 Updated:November 7, 2005
Description: The KOffice RTF import module suffers from a buffer overflow vulnerability which could be exploited via a malicious RTF file. See the KDE advisory for details.
Alerts:
Slackware SSA:2005-310-02 koffice 2005-11-07
Debian DSA-872-1 koffice 2005-10-26
Mandriva MDKSA-2005:185 koffice 2005-10-14
Fedora FEDORA-2005-984 koffice 2005-10-13
Gentoo 200510-12 koffice 2005-10-14
Ubuntu USN-202-1 koffice 2005-10-12

Comments (none posted)

libuser: denial of service

Package(s):libuser CVE #(s):CAN-2004-2392
Created:October 11, 2005 Updated:October 12, 2005
Description: Several denial of service bugs were discovered in libuser. Under certain conditions it is possible for an application linked against libuser to crash or operate irregularly.
Alerts:
Red Hat RHSA-2005:770-01 libuser 2005-10-11

Comments (none posted)

mason: open firewall vulnerability

Package(s):mason CVE #(s):CAN-2005-3118
Created:October 6, 2005 Updated:October 10, 2005
Description: The mason firewall creating utility fails to install the init script, leaving the machine without a firewall after the next reboot.
Alerts:
Debian DSA-845-1 mason 2005-10-06

Comments (none posted)

mozilla: symlink attack

Package(s):mozilla CVE #(s):CAN-2005-2353
Created:October 7, 2005 Updated:October 10, 2005
Description: The run-mozilla.sh script, with debugging enabled, would allow local users to create or overwrite arbitrary files via a symlink attack on temporary files.
Alerts:
Mandriva MDKSA-2005:174 mozilla-thunderbird 2005-10-06
Mandriva MDKSA-2005:173 mozilla-firefox 2005-10-06

Comments (none posted)

openssl: protocol rollback

Package(s):openssl CVE #(s):CAN-2005-2969
Created:October 12, 2005 Updated:December 19, 2005
Description: OpenSSL prior to version 0.9.7h or 0.9.8a contains a vulnerability which could enable an attacker to force the use of the older, less secure SSL 2.0 protocol. See this advisory for details or this analysis for even more details.
Alerts:
Fedora-Legacy FLSA:166939 openssl 2005-12-17
Debian DSA-888-1 openssl 2005-11-07
Debian DSA-882-1 openssl095 2005-11-04
Debian DSA-881-1 openssl096 2005-11-04
Debian DSA-875-1 openssl094 2005-10-27
SuSE SUSE-SA:2005:061 openssl 2005-10-19
OpenPKG OpenPKG-SA-2005.022 openssl 2005-10-17
Fedora FEDORA-2005-986 openssl 2005-10-13
Fedora FEDORA-2005-985 openssl 2005-10-13
Ubuntu USN-204-1 openssl 2005-10-14
Slackware SSA:2005-286-01 openssl 2005-10-14
Mandriva MDKSA-2005:179 openssl 2005-10-11
Gentoo 200510-11 openssl 2005-10-12
Red Hat RHSA-2005:800-01 OpenSSL 2005-10-11

Comments (1 posted)

ruby: bypass object flags

Package(s):ruby1.8 CVE #(s):CAN-2005-2337
Created:October 10, 2005 Updated:October 21, 2005
Description: The object oriented scripting language Ruby supports safely executing untrusted code with two mechanisms: safe level and taint flag on objects. Dr. Yutaka Oiwa discovered a vulnerability that allows Ruby methods to bypass these mechanisms. In systems which use this feature, this could be exploited to execute Ruby code beyond the restrictions specified in each safe level.
Alerts:
Mandriva MDKSA-2005:191 ruby 2005-10-20
Debian DSA-864-1 ruby1.8 2005-10-13
Red Hat RHSA-2005:799-01 ruby 2005-10-11
Debian DSA-862-1 ruby1.8 2005-10-11
Debian DSA-860-1 ruby 2005-10-11
Ubuntu USN-195-1 ruby1.8 2005-10-10

Comments (none posted)

squirrelmail: cross-site scripting

Package(s):squirrelmail CVE #(s):CAN-2005-3128
Created:October 12, 2005 Updated:October 12, 2005
Description: Yet another cross-site scripting vulnerability has been found in squirrelmail; this one affects the "Address Add" plugin.
Alerts:
Mandriva MDKSA-2005:178 squirrelmail 2005-10-11

Comments (none posted)

up-imapproxy: format string vulnerabilities

Package(s):up-imapproxy CVE #(s):CAN-2005-2661
Created:October 10, 2005 Updated:March 7, 2006
Description: up-imapproxy contains two format string vulnerabilities which could be exploited to execute arbitrary code.
Alerts:
Gentoo 200603-04 up-imapproxy 2006-03-06
Debian DSA-852-1 up-imapproxy 2005-10-09

Comments (none posted)

uw-imap: buffer overflow

Package(s):uw-imap CVE #(s):CAN-2005-2933
Created:October 11, 2005 Updated:April 10, 2006
Description: "infamous41md" discovered a buffer overflow in uw-imap, the University of Washington's IMAP Server that allows attackers to execute arbitrary code.
Alerts:
Fedora-Legacy FLSA:184098 libc-client 2006-04-04
Fedora-Legacy FLSA:170411 imap 2006-04-04
Fedora FEDORA-2005-1112 libc-client 2005-12-08
Fedora FEDORA-2005-1115 libc-client 2005-12-08
Red Hat RHSA-2005:850-01 imap 2005-12-06
Red Hat RHSA-2005:848-01 libc-client 2005-12-06
Mandriva MDKSA-2005:194 php-imap 2005-10-26
Trustix TSLSA-2005-0055 cvs rsync uw-imap 2005-10-07
Mandriva MDKSA-2005:189 imap 2005-10-20
SuSE SUSE-SR:2005:023 multi 2005-10-14
Gentoo 200510-10 uw-imap 2005-10-11
Debian DSA-861-1 uw-imap 2005-10-11

Comments (none posted)

weex: format string vulnerability

Package(s):weex CVE #(s):CAN-2005-3150
Created:October 10, 2005 Updated:October 10, 2005
Description: Ulf Härnhammar from the Debian Security Audit Project discovered a format string vulnerability in the Log_Flush function in Weex 2.6.1.5, 2.6.1, and possibly other versions. This could be exploited to execute arbitrary code on the clients machine.
Alerts:
Debian DSA-855-1 weex 2005-10-10
Gentoo 200510-09 weex 2005-10-08

Comments (none posted)

xine-lib: arbitrary code execution

Package(s):xine-lib CVE #(s):CAN-2005-2967
Created:October 10, 2005 Updated:October 12, 2005
Description: Ulf Harnhammar discovered a format string vulnerability in the CDDB module's cache file handling in the Xine library, which is used by packages such as xine-ui, totem-xine, and gxine. By tricking an user into playing a particular audio CD which has a specially-crafted CDDB entry, a remote attacker could exploit this vulnerability to execute arbitrary code with the privileges of the user running the application. Since CDDB servers usually allow anybody to add and modify information, this exploit does not even require a particular CDDB server to be selected.
Alerts:
Mandriva MDKSA-2005:180 xine-lib 2005-10-11
Debian DSA-863-1 xine-lib 2005-10-12
Slackware SSA:2005-283-01 xine 2005-10-11
Ubuntu USN-196-1 xine-lib 2005-10-10
Gentoo 200510-08 xine-lib 2005-10-08

Comments (none posted)

xloadimage: buffer overflows

Package(s):xloadimage CVE #(s):CAN-2005-3178
Created:October 10, 2005 Updated:May 15, 2006
Description: Three buffer overflows were discovered in xloadimage when handling the image title name. A malicious user can construct a NIFF file that when viewed and processed (with either zoom, reduce or rotate) by xloadimage, will cause the program to overwrite the return address and execute arbitrary code.
Alerts:
Fedora-Legacy FLSA:152923 xloadimage 2006-05-12
Gentoo 200510-26 xli 2005-10-30
Mandriva MDKSA-2005:192 xli 2005-10-20
Red Hat RHSA-2005:802-01 xloadimage 2005-10-18
Debian DSA-859-1 xli 2005-10-10
Debian DSA-858-1 xloadimage 2005-10-10
Fedora FEDORA-2005-981 xloadimage 2005-10-10

Comments (none posted)

Page editor: Jonathan Corbet
Next page: Kernel development>>


Copyright © 2005, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds