[<prev] [next>] [day] [month] [year] [list]
Message-ID: <200305220454.h4M4sDR91626@milan.maths.usyd.edu.au>
Date: Thu, 22 May 2003 14:54:13 +1000 (EST)
From: psz@...hs.usyd.edu.au (Paul Szabo)
To: NTBugtraq@...tserv.ntbugtraq.com, bugtraq@...urityfocus.com,
full-disclosure@...ts.netsys.com
Subject: Eudora 5.2.1 attachment spoof
Qualcomm Eudora 5.2.1 has been released recently. Quoting from
http://www.eudora.com/download/eudora/windows/5.2.1/RelNotes.txt :
> Improved guarding against spoofed Attachment Converted: lines.
Attachments can still be spoofed by including a CR (ctrl-M, x0d, ASCII 13)
character anywhere within the "Attachment Converted:" string [these get
converted internally into a NUL (x00) and ignored], e.g.:
Attachments can still be spoofed by including a CR=x0d character anywhere
within the "Attachment Converted:" string (these get converted internally
into a NUL=x00 and ignored), e.g.:
Attachment<CR> Converted: "c:\winnt\system32\calc.exe" NoAttachIcon
Attachment
Converted: "c:\winnt\system32\calc.exe" NoAttachIcon
(First line with four-character <CR> marker for the sake of Eudora users.)
For history, please see also:
http://www.securityfocus.com/archive/1/299730
http://www.securityfocus.com/archive/1/286634
Cheers,
Paul Szabo - psz@...hs.usyd.edu.au http://www.maths.usyd.edu.au:8000/u/psz/
School of Mathematics and Statistics University of Sydney 2006 Australia
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html
Powered by blists - more mailing lists