[Esa-l] Exploit using Eudora and the Guninski hole (fwd)

John D. Hardin jhardin at wolfenet.com
Thu Sep 21 19:45:21 PDT 2000


Attachments removed. See the bugtraq archives if you really want them.

--
 John Hardin KA7OHZ   ICQ#15735746   http://www.wolfenet.com/~jhardin/
 jhardin at wolfenet.com      pgpk -a finger://gonzo.wolfenet.com/jhardin
  768: 0x41EA94F5 - A3 0C 5B C2 EF 0D 2C E5  E9 BF C8 33 A7 A9 CE 76 
 1024: 0xB8732E79 - 2D8C 34F4 6411 F507 136C  AF76 D822 E6E6 B873 2E79
-----------------------------------------------------------------------
  "Bother," said Pooh as he struggled with /etc/sendmail.cf, "it never
  does quite what I want. I wish Christopher Robin was here."
				-- Peter da Silva in a.s.r
-----------------------------------------------------------------------
   38 days until Daylight Savings Time ends

---------- Forwarded message ----------
Date: Tue, 19 Sep 2000 15:47:03 -0400
From: Louis-Eric Simard <Louis-Eric at SIMARD.COM>
To: BUGTRAQ at SECURITYFOCUS.COM
Subject: Exploit using Eudora and the Guninski hole



SIMARD SECURITY ADVISORY 20000919.1
by Louis-Eric Simard, Security Consultant (Louis-Eric at Simard.com)


   RELEASE DATE
   September 19th 2000

   TESTED SYSTEMS
   Windows 2000 [5.00.2195] running Eudora 4.3.2. Later versions of Eudora
have not been tested.

   SYNOPSIS
   A malicious intruder can easily take control of a Windows environment by
simply sending one or more e-mails containing attachments conforming to
   the description set in the Georgi Guninski security advisory #21 if the
receiver is using Eudora as a mail client.

   PROBLEM DESCRIPTION
   Eudora saves all attachments in a single directory upon receiving the
mail; a mail message need not be open for its attachment to be decoded
   and saved in that common directory. An intruder need only send an e-mail
with a trojaned DLL as described in the Guninski advisory, along with
   or followed by an e-mail containing a Word document.

   DEMONSTRATION
   A dummy RICHED20.DLL file is attached here. To test the security hole,
simply mail this file along with the supplied (or any) Word file, then
   click on the Word file. After a few seconds, a message box titled
"Gotcha" will appear, indicating "Fake RICHED20.DLL loaded."

   ACKNOWLEDGEMENTS
   Gergi Guninski for pointing out this issue in the first place.

   COMMENTS
   Please send suggestions, updates and comments to Louis-Eric at Simard.com.

   DISCLAIMER
   Louis-Eric Simard and The Freedom Factory, Inc. are not responsible for
the misuse of any of the information they provide through their security
   advisories. Our advisories are a service to the information security
community intended to promote safe computing practices and warn users of
   possible security breaches. The information within this document may
change without notice. Use of this information constitutes acceptance for
   use in an AS IS condition. There are NO warranties with regard to this
information. In no event shall the author(s) be liable for any consequences
   whatsoever arising out of or in connection with the use or spread of
this information. Any use of this information lays within the user's
   responsibility.

   COPYRIGHT
   This advisory and acocmpanying document(s), if any, are the property of
The Freedom Factory, Inc. All rights reserved.





More information about the esd-l mailing list