Qualcomm Eudora File Attachment Spoofing Vulnerability

medium Nessus Network Monitor Plugin ID 1284

Synopsis

By spoofing file extensions, an attacker may be able to coerce malicious code execution

Description

The remote client is running a version of the Eudora mail client that may be vulnerable to an issue where a remote attacker may spoof the file extension in an attachment. This may aid the attacker in enticing a user of the email client into executing malicious content, and in avoiding generating warning messages.

Solution

Upgrade to the latest version of Eudora

Plugin Details

Severity: Medium

ID: 1284

Family: SMTP Clients

Published: 8/20/2004

Updated: 3/6/2019

Risk Information

VPR

Risk Factor: Medium

Score: 5.0

CVSS v2

Risk Factor: Medium

Base Score: 6.4

Temporal Score: 5.3

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:N

CVSS v3

Risk Factor: Medium

Base Score: 6.5

Temporal Score: 6

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:X

Vulnerability Information

CPE: cpe:/a:qualcomm:eudora

Reference Information

CVE: CVE-2002-2351

BID: 5432, 7653