SecurityTracker.com
Keep Track of the Latest Vulnerabilities
with SecurityTracker!
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 
Sign Up
Sign Up for Your FREE Weekly SecurityTracker E-mail Alert Summary
Instant Alerts
Buy our Premium Vulnerability Notification Service to receive customized, instant alerts
Affiliates
Put SecurityTracker Vulnerability Alerts on Your Web Site -- It's Free!
Partners
Become a Partner and License Our Database or Notification Service
Report a Bug
Report a vulnerability that you have found to SecurityTracker
bugs
@
securitytracker.com






Category:   Application (E-mail Client)  >   Eudora Vendors:   Qualcomm
Eudora Bugs in Processing E-mail, Stationary Files, or Mailbox Files Let Remote Users Execute Arbitrary Code
SecurityTracker Alert ID:  1013070
SecurityTracker URL:  http://securitytracker.com/id/1013070
CVE Reference:   GENERIC-MAP-NOMATCH   (Links to External Site)
Date:  Feb 3 2005
Impact:   Execution of arbitrary code via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 6.2.0 and prior versions
Description:   Several unspecified vulnerabilities were reported in Eudora. A remote user can execute arbitrary code on the target user's system.

NGSSoftware reported that the software contains multiple 'high risk' flaws. Only the Windows version is affected.

A remote user can send a specially crafted e-mail message that, when viewed or previewed by the target user, will execute arbitrary code on the target user's system.

A remote user can also create a specially crafted stationary or mailbox file that, when opened by the target user, will execute arbitrary code on the target user's sytem.

NGSSoftware plans to issue details on May 2, 2005.

John Heasman is credited with discovering these flaws.

Impact:   A remote user can cause arbitrary code to be executed on the target user's computer with the privileges of the target user.
Solution:   The vendor has issued a fixed version (6.2.1), available at:

http://www.eudora.com/download/

Vendor URL:  www.eudora.com/ (Links to External Site)
Cause:   Not specified
Underlying OS:  Windows (Any)

Message History:   None.


 Source Message Contents

Date:  Wed, 2 Feb 2005 19:31:56 -0000
Subject:  [VulnWatch] High Risk Vulnerabilities in Eudora Mail Client


------=_NextPart_000_0017_01C5095D.DB5B00F0
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

John Heasman of NGSSoftware has discovered multiple high risk
vulnerabilities in the Windows version of Eudora.
Versions affected include:

Eudora 6.2.0 and below

The flaws permit execution of arbitrary code via:

1) previewing or opening a specially crafted email
2) opening specially crafted stationary or mailbox files

These issues have been resolved in Eudora 6.2.1 as detailed at
http://www.eudora.com/security.html

It can be downloaded from:

http://www.eudora.com/products/

NGSSoftware are going to withhold details of this flaw for three months.
Full details will be published on the 2nd of May 2005. This three month
window will allow users of Eudora the time needed to apply the patch =
before
the details are released to the general public. This reflects =
NGSSoftware's
approach to responsible disclosure.


NGSSoftware Insight Security Research
http://www.databasesecurity.com/
http://www.nextgenss.com/
+44(0)208 401 0070



------=_NextPart_000_0017_01C5095D.DB5B00F0--


 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

Copyright 2017, SecurityGlobal.net LLC