[Full-Disclosure] Eudora 5.2.1 attachment spoof

From: Paul Szabo (pszat_private)
Date: Wed May 21 2003 - 21:54:13 PDT

  • Next message: dong-h0un U: "[Full-Disclosure] WsMp3d remote exploit."

    Qualcomm Eudora 5.2.1 has been released recently. Quoting from
    http://www.eudora.com/download/eudora/windows/5.2.1/RelNotes.txt :
    
    > Improved guarding against spoofed Attachment Converted: lines.
    
    Attachments can still be spoofed by including a CR (ctrl-M, x0d, ASCII 13)
    character anywhere within the "Attachment Converted:" string [these get
    converted internally into a NUL (x00) and ignored], e.g.:
    
    Attachments can still be spoofed by including a CR=x0d character anywhere
    within the "Attachment Converted:" string (these get converted internally
    into a NUL=x00 and ignored), e.g.:
    
    
    Attachment<CR> Converted: "c:\winnt\system32\calc.exe" NoAttachIcon
    Attachment
     Converted: "c:\winnt\system32\calc.exe" NoAttachIcon
    
    (First line with four-character <CR> marker for the sake of Eudora users.)
    
    For history, please see also:
      http://www.securityfocus.com/archive/1/299730
      http://www.securityfocus.com/archive/1/286634
    
    Cheers,
    
    Paul Szabo - pszat_private  http://www.maths.usyd.edu.au:8000/u/psz/
    School of Mathematics and Statistics  University of Sydney   2006  Australia
    _______________________________________________
    Full-Disclosure - We believe in it.
    Charter: http://lists.netsys.com/full-disclosure-charter.html
    



    This archive was generated by hypermail 2b30 : Wed May 21 2003 - 22:32:27 PDT