vendor:
Eudora
by:
Krystian Kloskowski (h07) <h07@interia.pl>
7.5
CVSS
HIGH
Buffer Overflow
119
CWE
Product Name: Eudora
Affected Version From: Eudora 7.1.0.9
Affected Version To: Eudora 7.1.0.9
Patch Exists: NO
Related CWE:
CPE: a:eudora:eudora:7.1.0.9
Platforms Tested: Windows XP SP2 Polish
2007
Eudora 7.1 SMTP Response 0day Remote Buffer Overflow PoC Exploit
This exploit targets a buffer overflow vulnerability in Eudora 7.1.0.9. It allows an attacker to execute arbitrary commands on the target system. The exploit code is written in Python and includes a shellcode to execute the 'calc.exe' command on Windows systems. Note that this vulnerability can only be exploited if the user ignores the warning about the buffer overflow error.
Mitigation:
To mitigate this vulnerability, users should update to a patched version of Eudora. Additionally, users should always be cautious of ignoring warning messages related to buffer overflow errors.