vendor:
Eudora
by:
me
3.3
CVSS
MEDIUM
Spoofing
20
CWE
Product Name: Eudora
Affected Version From: 6.1.2001
Affected Version To: 6.1.2001
Patch Exists: YES
Related CWE: N/A
CPE: a:qualcomm:eudora:6.1.1
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Windows
2004
Eudora 6.1.1 on Windows spoof, LaunchProtect
A problem has been identified in the implementation of LaunchProtect within Eudora. Because of this, it may be possible to trick users into performing dangerous actions by spoofing attachments. This can be done by using <x-xyz></x-xyz> constructs (x-html, x-rich or x-flowed) and embedding CR=x0d characters which get converted internally into a NUL=x00 and ignored, so spoofing "attachment converted" lines. At version 6.1.1, embedded CR seem to get converted into NL=x0a.
Mitigation:
Users should be aware of the potential for spoofing and should be cautious when opening attachments.