Home    |    View Topics    |    Search    |    Contact Us    |   



Category:   Application (E-mail Client)  >   Eudora Vendors:   Qualcomm
Eudora Bugs in Processing E-mail, Stationary Files, or Mailbox Files Let Remote Users Execute Arbitrary Code
SecurityTracker Alert ID:  1013070
SecurityTracker URL:
CVE Reference:   GENERIC-MAP-NOMATCH   (Links to External Site)
Date:  Feb 3 2005
Impact:   Execution of arbitrary code via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 6.2.0 and prior versions
Description:   Several unspecified vulnerabilities were reported in Eudora. A remote user can execute arbitrary code on the target user's system.

NGSSoftware reported that the software contains multiple 'high risk' flaws. Only the Windows version is affected.

A remote user can send a specially crafted e-mail message that, when viewed or previewed by the target user, will execute arbitrary code on the target user's system.

A remote user can also create a specially crafted stationary or mailbox file that, when opened by the target user, will execute arbitrary code on the target user's sytem.

NGSSoftware plans to issue details on May 2, 2005.

John Heasman is credited with discovering these flaws.

Impact:   A remote user can cause arbitrary code to be executed on the target user's computer with the privileges of the target user.
Solution:   The vendor has issued a fixed version (6.2.1), available at:

Vendor URL: (Links to External Site)
Cause:   Not specified
Underlying OS:  Windows (Any)

Message History:   None.

 Source Message Contents

Subject:  [VulnWatch] High Risk Vulnerabilities in Eudora Mail Client

Content-Type: text/plain;
Content-Transfer-Encoding: quoted-printable

John Heasman of NGSSoftware has discovered multiple high risk
vulnerabilities in the Windows version of Eudora.
Versions affected include:

Eudora 6.2.0 and below

The flaws permit execution of arbitrary code via:

1) previewing or opening a specially crafted email
2) opening specially crafted stationary or mailbox files

These issues have been resolved in Eudora 6.2.1 as detailed at

It can be downloaded from:

NGSSoftware are going to withhold details of this flaw for three months.
Full details will be published on the 2nd of May 2005. This three month
window will allow users of Eudora the time needed to apply the patch =
the details are released to the general public. This reflects =
approach to responsible disclosure.

NGSSoftware Insight Security Research
+44(0)208 401 0070



Go to the Top of This SecurityTracker Archive Page

Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, LLC