Re: Images being pulled in Outlook 2003 even though don't download pictures is set?
The recent LIBPNG vulnerability can be exploited by sending HTML e-mail
containing an embedded malicious PNG image referenced locally using cid: as
well, if the recipient of the e-mail is using a vulnerable mail client. See
Chris Evans' security advisory
http://scary.beasts.org/security/CESA-2004-001.txt
Therefore this issue is somewhat serious, and deserves more attention. Mail
clients need to block automatic display of all images, not just those
referenced by external URL inside an img tag. It is a lot of work to locate
vulnerable binary code, notify vendors of vulnerable or flawed products and
teach them this remedial basic security principle. I am looking for volunteers
who are interested in helping out with this effort.
Does anyone have a list of closed-source products known to contain LIBPNG or
code derived from it that is believed vulnerable?
Most Secure Regards,
Jason Coombs
Director of Forensic Services
PivX Solutions, Inc.
Jcoombs@xxxxxxxx
-----Original Message-----
From: "CHRIS GRABENSTEIN" <CGRABENSTEIN@xxxxxxxx>
Date: Mon, 23 Aug 2004 15:20:39
To:<security-basics@xxxxxxxxxxxxxxxxx>
Subject: RE: Images being pulled in Outlook 2003 even though don't download
pictures is set?
The reference after cid: refers to an image embedded in the email itself.
The image arrives as part of the email rather than being pulled from a remote
server.
-----Original Message-----
From: Spencer, Mark [mailto:mspencer@xxxxxxxxxxxxxxx]
Sent: Sunday, August 22, 2004 12:36 PM
To: security-basics@xxxxxxxxxxxxxxxxx
Subject: Images being pulled in Outlook 2003 even though don't download
pictures is set?
I've been getting lots of spam with images being displayed, even though my
Outlook 2003 is set to not download pictures automatically. Here's what I
think is the relevant code (minus < and >):
DIV align=center
FONT face=Arial size=2
IMG src="cid:kfhyepds_bfjhwcxn_dkiaarqo"
/FONT
/DIV
/BODY
/HTML
Any advice on how to deal with this? How does that "cid: .." translate into
a legitimate IP address from which to pull an image?
Thanks!
---------------------------------------------------------------------------
Computer Forensics Training at the InfoSec Institute. All of our class sizes
are guaranteed to be 12 students or less to facilitate one-on-one interaction
with one of our expert instructors. Gain the in-demand skills of a certified
computer examiner, learn to recover trace data left behind by fraud, theft,
and cybercrime perpetrators. Discover the source of computer crime and abuse
so that it never happens again.
http://www.securityfocus.com/sponsor/InfoSecInstitute_security-basics_040817
----------------------------------------------------------------------------
---------------------------------------------------------------------------
Computer Forensics Training at the InfoSec Institute. All of our class sizes
are guaranteed to be 12 students or less to facilitate one-on-one
interaction with one of our expert instructors. Gain the in-demand skills of
a certified computer examiner, learn to recover trace data left behind by
fraud, theft, and cybercrime perpetrators. Discover the source of computer
crime and abuse so that it never happens again.
http://www.infosecinstitute.com/courses/computer_forensics_training.html
----------------------------------------------------------------------------