Eudora 4.x allows remote attackers to bypass the user warning for executable attachments such as .exe, .com, and .bat by using a .lnk file that refers to the attachment, aka "Stealth Attachment."
References
Link | Resource |
---|---|
http://news.cnet.com/news/0-1005-200-1773077.html?tag=st.ne.fd.lthd.1005-200-1773077 | Not Applicable Vendor Advisory |
http://www.peacefire.org/security/stealthattach/explanation.html | Exploit |
http://www.securityfocus.com/bid/1157 | Broken Link Third Party Advisory VDB Entry |
http://news.cnet.com/news/0-1005-200-1773077.html?tag=st.ne.fd.lthd.1005-200-1773077 | Not Applicable Vendor Advisory |
http://www.peacefire.org/security/stealthattach/explanation.html | Exploit |
http://www.securityfocus.com/bid/1157 | Broken Link Third Party Advisory VDB Entry |
Configurations
History
20 Nov 2024, 23:32
Type | Values Removed | Values Added |
---|---|---|
References | () http://news.cnet.com/news/0-1005-200-1773077.html?tag=st.ne.fd.lthd.1005-200-1773077 - Not Applicable, Vendor Advisory | |
References | () http://www.peacefire.org/security/stealthattach/explanation.html - Exploit | |
References | () http://www.securityfocus.com/bid/1157 - Broken Link, Third Party Advisory, VDB Entry |
02 Feb 2024, 02:05
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 5.0
v3 : 7.5 |
CPE | cpe:2.3:a:qualcomm:eudora:4.3:*:*:*:*:*:*:* |
cpe:2.3:a:qualcomm:eudora:4.0:*:*:*:*:*:*:* |
References | (BID) http://www.securityfocus.com/bid/1157 - Broken Link, Third Party Advisory, VDB Entry | |
References | (MISC) http://www.peacefire.org/security/stealthattach/explanation.html - Exploit | |
References | (CONFIRM) http://news.cnet.com/news/0-1005-200-1773077.html?tag=st.ne.fd.lthd.1005-200-1773077 - Not Applicable, Vendor Advisory | |
CWE | CWE-59 |
Information
Published : 2000-04-28 04:00
Updated : 2024-11-20 23:32
NVD link : CVE-2000-0342
Mitre link : CVE-2000-0342
CVE.ORG link : CVE-2000-0342
JSON object : View
Products Affected
qualcomm
- eudora
CWE
CWE-59
Improper Link Resolution Before File Access ('Link Following')