At 06:15 PM 8/7/2002, Atsushi Nishimura wrote:
>----------------------------------------------------------------------
>SNS Advisory No.55
>Eudora 5.x for Windows Buffer Overflow Vulnerability rev.2
>
>Problem first discovered: 6 Jun 2002
>Published: 5 Aug 2002
>Last revised: 8 Aug 2002
>----------------------------------------------------------------------
>
>Overview:
>---------
>   Eudora 5.x for Windows contains a buffer overflow vulnerability,
>   which could allow a remote attacker to execute arbitrary code.
>
>Problem Description:
>--------------------
>   Eudora developed and distributed by QUALCOMM Inc.
>   (http://www.qualcomm.com/), is a Mail User Agent running on Windows
>   95/98/2000/ME/NT 4.0 and MacOS 8.1 or later.
>
>   The buffer overflow occurs when Eudora receives a message using 139 bytes
>   or more of string as a boundary, which is used to divide a multi-part
>   message into separate parts. In our verification environment, we have
>   found that this could allow arbitrary commands to be executed.
>

For postfix users adding the following to header_checks should guard 
against this problem

/boundary=.{138,}$/                    REJECT MIME boundary too long

Not that only the most recent version of postfix understand mime so in 
older versions (pre 20020525) nested mime won't be blocked by this.

John



John Pettitt                                     Email: [EMAIL PROTECTED]

"Do what you feel in your heart to be right for you'll be criticized anyway."
                                                                                       
- 
Eleanor Roosevelt

Reply via email to