Home    |    View Topics    |    Search    |    Contact Us    |   



Category:   Application (E-mail Client)  >   Eudora Vendors:   Qualcomm
Re: Eudora E-mail Client May Silently Install and Execute Malicious Trojan Software
SecurityTracker Alert ID:  1001136
SecurityTracker URL:
CVE Reference:   GENERIC-MAP-NOMATCH   (Links to External Site)
Date:  Mar 22 2001
Impact:   Execution of arbitrary code via network
Exploit Included:  Yes  
Version(s): 5.02 Sponsored Mode
Description:   A vulnerability has been reported in Qualcomm's Eudora e-mail client that allows malicious trojan code to be installed and executed automatically and without warning by an unwitting recipient when the e-mail is read.

The author of this message notes that even with the "Allow executables in HTML content" setting turned off (as is recommended by the vendor), some exploits can still be effective. Some demonstration code is provided in the source message. The author recommends disabling the "use icrosoft Viewer" setting.

Impact:   An unsuspectig Eudora e-mail client user may inadvertently cause malicious trojan software to be installed and executed by reading a malicious e-mail message.
Solution:   No solution was available at the time of this entry. The author of the report suggests disabling "use Microsoft viewer" and "allow executables in HTML content."
Vendor URL: (Links to External Site)
Cause:   Access control error
Underlying OS:  Apple (Legacy "classic" Mac), Windows (NT), Windows (95), Windows (98), Windows (2000)

Message History:   This archive entry is a follow-up to the message listed below.
Mar 19 2001 Eudora E-mail Client May Silently Install and Execute Malicious Trojan Software

 Source Message Contents

Subject:  Re:!dora.exploit

|Jeff Beckley wrote:
|At 01:38 AM 3/18/2001 -0800, wrote:
|>Silent delivery and installation of an executable on a target |>computer.
No client input other than opening an email using Eudora |>5.02 - Sponsored
Mode provided 'use Microsoft viewer' and 'allow |>executables in HTML
content' are enabled.
|The "Allow executables in HTML content" setting is turned off by
|default.  The online help and user manual mention that the setting |should
remain off for security reasons.

This of course is 100% correct. Unfortunately on closer examination we find
that this too can be defeated quite easily.  Consider the following

<!doctype html public "-//w3c//dtd html 4.0 transitional//en">

<img SRC="file://C:\WINDOWS\APPLIC~1\QUALCOMM\EUDORA\Embedded\malware.gif"
height=2 width=2


This slips through, with "Allow executables in HTML content" disabled.
therefore the results will be the same:

<img SRC="" height=1 width=1


Disable the 'Microsoft Viewer" thing. That's the problem.

A good repair can be by reviewing all the necessary tricks to inject
JavaScript into Hotmail Accounts. These are well documented here and dating
back for quite some time. It appears the mail client seeks typical script
tags, which is defeated as above.  Additional you might want to not allow a
crafted inline file to transfer automatically to your embedded folder:

Content-Type: application/octet-stream; charset=iso-8859-1
Content-ID: <>
Content-Transfer-Encoding: base64
Content-Disposition: inline; filename="You!DORA.html"

We note that if the content-type is manipulated we can route the file to the
'Embedded' folder. Casual observation suggests image files and *.exe are
routed there. While *.html is not, hence the constructed Content-Type:
application/octet-stream; charset=iso-8859-1 while the file is:
Content-Disposition: inline; filename="You!DORA.html"


Send a cool gift with your E-Card


Go to the Top of This SecurityTracker Archive Page

Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, LLC