header-logo
Suggest Exploit
vendor:
Eudora Email Client
by:
5.5
CVSS
MEDIUM
Circumvention of Warning Messages
311
CWE
Product Name: Eudora Email Client
Affected Version From: Eudora 4.2
Affected Version To: Eudora 4.3
Patch Exists: NO
Related CWE:
CPE: a:eudora:eudora:4.2
Metasploit:
Other Scripts:
Platforms Tested: Windows

Circumvention of Warning Messages in Eudora Email Client

A malicious email sender can bypass warning messages in Eudora 4.2/4.3 by inserting a specific tag in an email message. This allows them to open executable attachments without triggering the usual warning message.

Mitigation:

Users should exercise caution when opening email attachments and ensure that they only open files from trusted sources. Additionally, it is recommended to keep the Eudora email client up to date with the latest security patches.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/1157/info

A malicious email sender can circumvent warning messages that would normally display when a user attempts to view executable attachments in Eudora 4.2/4.3. Eudora does not prompt a user with the warning message if they are attempting to open a file that is neither .exe, .com, or .bat.

Inserting the tag
<a &nbsp;href="file:///c:/eudora/attach/file.lnk"\>http&nbsp;://www.example.com</&nbsp;a>
in an email message will display as:
http&nbsp;://www.example.com
in a Eudora email client.

Therefore, when a user clicks on this link, it will automatically open up the executable file without warning.