Eudora Bugs in Processing E-mail, Stationary Files, or Mailbox Files Let Remote Users Execute Arbitrary Code
SecurityTracker Alert ID: 1013070|
SecurityTracker URL: http://securitytracker.com/id/1013070
(Links to External Site)
Date: Feb 3 2005
Execution of arbitrary code via network, User access via network|
Fix Available: Yes Vendor Confirmed: Yes |
Version(s): 6.2.0 and prior versions|
Several unspecified vulnerabilities were reported in Eudora. A remote user can execute arbitrary code on the target user's system.|
NGSSoftware reported that the software contains multiple 'high risk' flaws. Only the Windows version is affected.
A remote user can send a specially crafted e-mail message that, when viewed or previewed by the target user, will execute arbitrary code on the target user's system.
A remote user can also create a specially crafted stationary or mailbox file that, when opened by the target user, will execute arbitrary code on the target user's sytem.
NGSSoftware plans to issue details on May 2, 2005.
John Heasman is credited with discovering these flaws.
A remote user can cause arbitrary code to be executed on the target user's computer with the privileges of the target user.|
The vendor has issued a fixed version (6.2.1), available at:|
Vendor URL: www.eudora.com/ (Links to External Site)
|Underlying OS: Windows (Any)|
Source Message Contents
Date: Wed, 2 Feb 2005 19:31:56 -0000|
Subject: [VulnWatch] High Risk Vulnerabilities in Eudora Mail Client
John Heasman of NGSSoftware has discovered multiple high risk
vulnerabilities in the Windows version of Eudora.
Versions affected include:
Eudora 6.2.0 and below
The flaws permit execution of arbitrary code via:
1) previewing or opening a specially crafted email
2) opening specially crafted stationary or mailbox files
These issues have been resolved in Eudora 6.2.1 as detailed at
It can be downloaded from:
NGSSoftware are going to withhold details of this flaw for three months.
Full details will be published on the 2nd of May 2005. This three month
window will allow users of Eudora the time needed to apply the patch =
the details are released to the general public. This reflects =
approach to responsible disclosure.
NGSSoftware Insight Security Research
+44(0)208 401 0070