vendor:
Eudora
by:
SecurityFocus
7.5
CVSS
HIGH
Spoofing File Extension
20
CWE
Product Name: Eudora
Affected Version From: Eudora 6.0
Affected Version To: Eudora 6.0
Patch Exists: No
Related CWE: N/A
CPE: a:qualcomm:eudora:6.0
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Windows
2002
Eudora 6.0 on Windows exploit
Eudora is reported to be prone to an issue which may allow attackers to spoof the file extension in an attachment. This may aid an attacker in enticing a user of the e-mail client into executing malicious content. It is possible to refer to other files or attachments in a message through specially formatted inline text. If the CR (carriage return) character (0x0D, Ctrl-M) is embedded anywhere in the 'Attachment Converted' string, it is possible to execute message attachments without further user interaction.
Mitigation:
Users should be aware of the potential for malicious content to be disguised as legitimate attachments. Users should be cautious when opening attachments from untrusted sources.