CERT Recently Published Vulnerability Notes 2024年07月06日
VU#302671: SMTP end-of-data uncertainty can be abused to spoof emails and bypass policies
index_new5.html
../../../zaker_core/zaker_tpl_static/wap/tpl_guoji1.html

 

SMTP Smuggling 漏洞利用了 SMTP 服务器和软件处理邮件消息结束序列的不一致性,攻击者可以利用该漏洞制作出绕过 SMTP 安全策略的邮件消息。攻击者可以伪造任何发送者在任何域名的邮件,并绕过邮件安全扫描器和网关的检测,从而发送垃圾邮件、钓鱼邮件等恶意邮件。

🤔 SMTP Smuggling 漏洞利用了 SMTP 服务器和软件处理邮件消息结束序列的不一致性,攻击者可以制作出绕过 SMTP 安全策略的邮件消息。攻击者可以通过构造特殊的邮件消息,使邮件服务器将该消息误认为多个邮件,从而绕过安全策略。

📧 攻击者可以通过构造特殊的邮件消息,使邮件服务器将该消息误认为多个邮件,从而绕过安全策略。攻击者可以伪造任何发送者在任何域名的邮件,并绕过邮件安全扫描器和网关的检测,从而发送垃圾邮件、钓鱼邮件等恶意邮件。

🛡️ 为了防止该漏洞被利用,邮件服务提供商和管理员需要及时更新邮件软件,并采取必要的安全措施,例如启用 DMARC 策略,加强邮件发送者身份验证等。

🔐 邮件用户也需要提高警惕,不要轻易点击来自未知来源的邮件中的链接,也不要向陌生人提供敏感信息。

🤝 邮件安全是一个复杂的议题,需要各方共同努力才能有效防御各种攻击。邮件服务提供商、邮件软件厂商、邮件安全产品厂商等都需要积极参与,共同维护互联网安全。

🚨 该漏洞影响范围广泛,包括 Exim、Postfix、Sendmail 等多种邮件服务器软件。建议所有使用这些软件的用户尽快更新至最新版本,并采取必要的安全措施。

Overview

A vulnerability has been found in the way that SMTP servers and software handle the end-of-data sequences (essentially the end of a single email message) in mail messages. An attacker can use this inconsistency to craft an email message that can bypass SMTP security policies.

Description

SMTP protocol (refer RFC 5321 and 5322), is an Internet based protocol for e-mail transmission and exchange. The SMTP protocol is used by multiple servers to relay emails as the email is exchanged between a sender and a recipient. This handover of emails allows for a complex number of next-hop servers to interact and exchange emails before its delivery to the intended recipient. A priority based Mail eXchange (MX) record also allows for emails to delivered to alternate servers or partner gateways to spool and deliver in cases of outages. In order prevent fraudulent emails, email software and services authenticate a user and employ security policies such DMARC, essentially a combination of SPF and DKIM, to certify an email's origination as it traverse these various services.

Security researcher Timo Longin at SEC Consult discovered that the email software deployed across numerous SMTP servers treats the end-of-data sequence inconsistently. An attacker can exploit this inconsistency by crafting an email message that deviates from the standard end-of-data sequence, causing confusion as the message is transferred to its next hop. Any email server within the route of SMTP Gateways processing this manipulated message may interpret the submitted data as multiple messages, then process and relay them forward. Postfix software developer Wietse Venema explained:

The attack involves a COMPOSITION of two email services with specific differences in the way they handle line endings other than CR LF

SEC-Consult researchers have labeled this vulnerability as "SMTP Smuggling" to discuss this problem that involves multiple stakeholders such as email service providers, email software vendors, email security product vendors and others that process and handle emails.

VU#302671An improper end-of-data sequence handling vulnerability in email software or services or appliances allow attackers to inject arbitrary email message that can bypass security policies.

An Openwall community discussion also lead to the reservation of the following CVE numbers

EximCVE-2023-51766
Postfix CVE-2023-51764
SendmailCVE-2023-51765

Impact

An attacker with access to an SMTP service can craft an email with improper end-of-data sequencing to submit two or more email messages that can be used to bypass security policy. When the attack is successful, the attacker can impersonate any sender in any domain that is hosted at the originating mail service. The attacker is then capable of avoiding In-place email handling policies, since email security scanners and gateways that analyze the message will fall prey to the improper sequencing of the message. A successful attack enables the attacker to impersonate any sender in any domain that is hosted at the originating mail service.

Solution

Email Service Providers and Administrators

Please ensure your email software is up to date and you have applied the right workaround and/or patches provided by your software vendor. Check the Vendor Information section for instructions and links to the either respective advisories. If you use Email Security Appliances or managed Email Gateways ensure their software is both up to date and is configured best to mitigate these attacks and reduce the risk of improper message relay to other SMTP servers. Ensure any email backup MX records and services that may be hosted by partners are also protected from misuse or abuse. Email service providers are also urged to ensure that the email sender verification and header verifications are performed on every email to ensure identity of the authenticated sender is properly represented in the submitted emails.

Email end users

As email sender verification continues to be a challenge in the Internet, email users are urged to continue their precaution when replying to emails to provide sensitive information or when clicking on links that can download or install malicious software.

Additionational Resources

SEC-Consult have provided both software and a website to support analysis of the various service providers and software vendors to ensure their software and services can be verified against these attacks.

Acknowledgements

Thanks to the reporter Timo Longin from SEC Consult. This document was written by Timur Snoke and Vijay Sarvepalli

Vendor Information

One or more vendors are listed for this advisory. Please reference the full report for more information.

Other Information

CVE IDs:
Date Public: 2024-01-16
Date First Published: 2024-01-16
Date Last Updated: 2024-01-31 18:07 UTC
Document Revision: 6

Fish AI Reader

Fish AI Reader

AI辅助创作,多种专业模板,深度分析,高质量内容生成。从观点提取到深度思考,FishAI为您提供全方位的创作支持。新版本引入自定义参数,让您的创作更加个性化和精准。

FishAI

FishAI

鱼阅,AI 时代的下一个智能信息助手,助你摆脱信息焦虑

联系邮箱 441953276@qq.com

相关标签

SMTP 漏洞 邮件安全 网络安全 SMTP Smuggling
相关文章