Short Name |
SMTP:EXT:DOUBLE-EXTENSION-MIME |
---|---|
Severity |
High |
Recommended |
No |
Category |
SMTP |
Keywords |
Double MIME Filename Extension |
Release Date |
2010/07/13 |
Update Number |
1729 |
Supported Platforms |
idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+ |
This signature detects the presence of a double filename extension in different parts of an e-mail message. Double extensions can be used to bypass some filtering systems by allowing harmful content to be considered legitimate. Successful exploitation could result in remote code execution. In order to provide protection from the base64 encoded version, change "sc_mime_parse_cnt_length" to at least 256 and preferably 512 bytes.
Microsoft Outlook is prone to a remote code-execution vulnerability because it fails to properly verify attachments. Attackers can exploit this issue by enticing an unsuspecting user into opening a specially crafted email attachment. Successfully exploiting this issue will allow an attacker to execute arbitrary code with the privileges of the currently logged-in user. Failed exploit attempts will result in a denial-of-service condition.