|
|
Subscribe / Log in / New account

Security

Fighting image spam

August 23, 2006

This article was contributed by Jake Edge.

A number of spammers have been evading filters like SpamAssassin (SA) recently by encoding their messages as images. SA already has a set of rules that are meant to combat image spam, but the more recent messages (typically for stock scams or pharmacy products) have been crafted to avoid them. This would indicate, once again, that spammers are using SA to pre-test their messages and are modifying them to get through. SA developers, however, are up to the challenge and two specific countermeasures have been released.

The first technique uses Optical Character Recognition (OCR) software to pull words out of the images and then uses a blacklist of words to increase the SA score. It was quickly realized that spammers are using similar obfuscation techniques in the images that they have long used in text emails (misspelling words, using characters that look like others, etc.) so a fuzzy matching was added to the plugin.

Unsurprisingly, there are already reports of images that put a light background of random 'snow' behind the text (example). This practice does not affect the readability for humans, but does affect the quality of the OCR output. The FuzzyOCR developers have quickly adapted by using a feature that removes smaller particles before doing the OCR scan. The question remains, of course, whether the OCR software will be able to keep up with obfuscations that will still be readable to humans. Human pattern matching may be too good for the state of the art in OCR.

The plugin uses several external programs from the netpbm tools, the gocr open source OCR program and several other libraries and perl modules. This is a fairly heavy handed approach, requiring a good bit of installation and configuration of the various pieces.

Another approach is the ImageInfo plugin, which does not require any external tools. It looks at the GIF and PNG headers of images in the email and calculates the area, in pixels, that they cover. Those values can be used in SA rules to increase the score of those having the characteristics of the latest image spam. The current ruleset penalizes single images that are larger than 180K pixels as well as a combinations of four or more images that total to more than 180K. It seems very likely that the spammers will be using the plugin and testing their images so this ruleset will likely have to evolve rather quickly.

It is interesting to watch the battle over our email inboxes as the level of cleverness of the spammers seems to be increasing over time. This is clearly an arms race and one that spam filtering developers will have to stay on top of for the foreseeable future. Long term solutions to the problem do not seem to exist and this incremental measure-countermeasure war is here to stay.

Comments (48 posted)

New vulnerabilities

binutils: buffer overflow

Package(s):binutils CVE #(s):CVE-2005-4807
Created:August 17, 2006 Updated:October 19, 2006
Description: The GNU assembler (gas) in binutils is vulnerable to a buffer overflow. If a user can be tricked into assembling a specially crafted file with gcc or gas, arbitrary code can be executed with the privileges of the user.
Alerts:
Ubuntu USN-366-1 binutils 2006-10-18
Ubuntu USN-336-1 binutils 2006-08-16

Comments (3 posted)

imagemagick: buffer overflow

Package(s):imagemagick CVE #(s):CVE-2006-4144
Created:August 17, 2006 Updated:August 29, 2006
Description: The imagemagick SGI file format decoder is vulnerable to a buffer overflow. If a user can be tricked into processing a specially crafted SGI image, arbitrary code may be executed with the privileges of the user.
Alerts:
Mandriva MDKSA-2006:155 ImageMagick 2006-08-29
rPath rPSA-2006-0159-1 ImageMagick 2006-08-29
Trustix TSLSA-2006-0048 imagemagick, kernel, php, php4 2006-08-25
Red Hat RHSA-2006:0633-03 ImageMagick 2006-08-24
Fedora FEDORA-2006-929 ImageMagick 2006-08-23
Ubuntu USN-337-1 imagemagick 2006-08-16

Comments (none posted)

php: multiple vulnerabilities

Package(s):php CVE #(s):
Created:August 18, 2006 Updated:August 23, 2006
Description: Several vulnerabilities have been fixed in PHP 4.4.4 and 5.1.5.
  • Added missing safe_mode/open_basedir checks inside the error_log(), file_exists(), imap_open() and imap_reopen() functions.
  • Fixed overflows inside str_repeat() and wordwrap() functions on 64bit systems.
  • Fixed possible open_basedir/safe_mode bypass in cURL extension and on PHP 5.1.5 with realpath cache.
  • Fixed overflow in GD extension on invalid GIF images.
  • Fixed a buffer overflow inside sscanf() function.
  • Fixed an out of bounds read inside stripos() function.
  • Fixed memory_limit restriction on 64 bit system.
Alerts:
Slackware SSA:2006-230-02 php 2006-08-18

Comments (none posted)

php: arbitrary code execution

Package(s):php CVE #(s):CVE-2006-4020
Created:August 22, 2006 Updated:September 21, 2006
Description: A vulnerability was discovered in the sscanf function that could allow attackers in certain circumstances to execute arbitrary code via argument swapping which incremented an index past the end of an array and triggered a buffer over-read.
Alerts:
Red Hat RHSA-2006:0682-01 PHP 2006-09-21
Ubuntu USN-342-1 php4, php5 2006-09-07
Gentoo 200608-28 php 2006-08-29
Mandriva MDKSA-2006:144 php 2006-08-21

Comments (none posted)

trac: missing input sanitizing

Package(s):trac CVE #(s):CVE-2006-3695
Created:August 18, 2006 Updated:August 23, 2006
Description: Felix Wiemann discovered that trac, an enhanced Wiki and issue tracking system for software development projects, can be used to disclose arbitrary local files. To fix this problem, python-docutils needs to be updated as well.
Alerts:
Debian DSA-1152-1 trac 2006-08-18

Comments (none posted)

Page editor: Jonathan Corbet
Next page: Kernel development>>


Copyright © 2006, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds