lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <200305220454.h4M4sDR91626@milan.maths.usyd.edu.au>
From: psz at maths.usyd.edu.au (Paul Szabo)
Subject: Eudora 5.2.1 attachment spoof

Qualcomm Eudora 5.2.1 has been released recently. Quoting from
http://www.eudora.com/download/eudora/windows/5.2.1/RelNotes.txt :

> Improved guarding against spoofed Attachment Converted: lines.

Attachments can still be spoofed by including a CR (ctrl-M, x0d, ASCII 13)
character anywhere within the "Attachment Converted:" string [these get
converted internally into a NUL (x00) and ignored], e.g.:

Attachments can still be spoofed by including a CR=x0d character anywhere
within the "Attachment Converted:" string (these get converted internally
into a NUL=x00 and ignored), e.g.:


Attachment<CR> Converted: "c:\winnt\system32\calc.exe" NoAttachIcon
Attachment
 Converted: "c:\winnt\system32\calc.exe" NoAttachIcon

(First line with four-character <CR> marker for the sake of Eudora users.)

For history, please see also:
  http://www.securityfocus.com/archive/1/299730
  http://www.securityfocus.com/archive/1/286634

Cheers,

Paul Szabo - psz@...hs.usyd.edu.au  http://www.maths.usyd.edu.au:8000/u/psz/
School of Mathematics and Statistics  University of Sydney   2006  Australia

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ