Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Signature Detail

Security Intelligence Center
Signatures
Print

Short Name

SMTP:EXPLOIT:EUDORA-URL-SPOOF

Severity

Low

Recommended

No

Category

SMTP

Keywords

eudora

Release Date

2004/11/17

Update Number

1213

Supported Platforms

di-5.3+, idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

SMTP: Eudora URL Spoofing


This signature detects attempts to exploit a vulnerability in the Eudora mail client. By supplying a link containing character entities, an attacker can force Eudora to display a link as something other than what it really is.

Extended Description

It has been reported that the Qualcomm Eudora MTA is prone to a URI obfuscation weakness that may hide the true contents of a link. The problem occurs when a user@location URI is formatted in such a way that a "^A" control character is located after the user value. The user value may then be appended with space characters to obfuscate status bar and mouseover details. It is said that, when doing a mouseover of such a URI, it will cause the status bar to only display the contents of the user value, not the entire link.

Affected Products

  • Microsoft Outlook Express 6.0
  • Qualcomm Eudora 6.0.0
  • Qualcomm Eudora 6.0.0 .22
  • Qualcomm Eudora 6.0.1
  • Qualcomm Eudora 6.0.3
  • Qualcomm Eudora 6.1.0

References

  • BugTraq: 10305
  • URL: http://www.eudora.com
  • URL: http://www.securityfocus.com/archive/1/362599

Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out