SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (E-mail Client)  >   Eudora Vendors:   Qualcomm
Re: Eudora E-mail Client May Silently Install and Execute Malicious Trojan Software
SecurityTracker Alert ID:  1001130
SecurityTracker URL:  http://securitytracker.com/id/1001130
CVE Reference:   GENERIC-MAP-NOMATCH   (Links to External Site)
Date:  Mar 20 2001
Impact:   Execution of arbitrary code via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 5.02 Sponsored Mode
Description:   A vulnerability has been reported in Qualcomm's Eudora e-mail client that allows malicious trojan code to be installed and executed automatically and without warning by an unwitting recipient when the e-mail is read.

The vendor notes that the "Allow executables in HTML content" configuration setting is turned off by default and that the online help and user manual mention that the setting should remain off for security reasons.

Impact:   An unsuspectig Eudora e-mail client user may inadvertently cause malicious trojan software to be installed and executed by reading a malicious e-mail message.
Solution:   No solution was available at the time of this entry. The author of the report suggests disabling "use Microsoft viewer" and "allow executables in HTML content."
Vendor URL:  www.eudora.com/ (Links to External Site)
Cause:   Access control error
Underlying OS:  Apple (Legacy "classic" Mac), Windows (NT), Windows (95), Windows (98), Windows (2000)

Message History:   This archive entry is a follow-up to the message listed below.
Mar 19 2001 Eudora E-mail Client May Silently Install and Execute Malicious Trojan Software



 Source Message Contents

Subject:  Re: feeble.you!dora.exploit


At 01:38 AM 3/18/2001 -0800, http-equiv@excite.com wrote:
>Silent delivery and installation of an executable on a target computer. No
>client input other than opening an email using Eudora 5.02 - Sponsored Mode
>provided 'use Microsoft viewer' and 'allow executables in HTML content' are
>enabled.

The "Allow executables in HTML content" setting is turned off by
default.  The online help and user manual mention that the setting should
remain off for security reasons.

 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, SecurityGlobal.net LLC