Bugtraq mailing list archives
Re: [SNS Advisory No.55] Eudora 5.x for Windows Buffer Overflow Vulnerability
From: "John D. Hardin" <jhardin () impsec org>
Date: Thu, 15 Aug 2002 19:22:28 -0700 (PDT)
On Mon, 5 Aug 2002, Hack Hawk wrote:
As I use Eudora, I'm currently developing a work around to protect myself from this vulnerability. Basically just a filter program on the Linux server.
Have you seen http://www.impsec.org/email-tools/procmail-security.html yet? This exploit's been sanitized by it since, oh, early 2000 or so... -- John Hardin KA7OHZ ICQ#15735746 http://www.impsec.org/~jhardin/ jhardin () impsec org pgpk -a jhardin () impsec org 768: 0x41EA94F5 - A3 0C 5B C2 EF 0D 2C E5 E9 BF C8 33 A7 A9 CE 76 1024: 0xB8732E79 - 2D8C 34F4 6411 F507 136C AF76 D822 E6E6 B873 2E79 ----------------------------------------------------------------------- ...the Fates notice those who buy chainsaws... -- www.darwinawards.com ----------------------------------------------------------------------- 125 days until The Two Towers
Current thread:
- [SNS Advisory No.55] Eudora 5.x for Windows Buffer Overflow Vulnerability snsadv (Aug 05)
- Re: [SNS Advisory No.55] Eudora 5.x for Windows Buffer Overflow Vulnerability Hack Hawk (Aug 06)
- Fate Research Labs Advisory: Retrieve SHOUTcast Admin Password Through GET / Loki (Aug 06)
- Re: [SNS Advisory No.55] Eudora 5.x for Windows Buffer Overflow Vulnerability John D. Hardin (Aug 16)
- Re: [SNS Advisory No.55] Eudora 5.x for Windows Buffer Overflow Vulnerability Kanatoko (Aug 06)
- Re: [SNS Advisory No.55] Eudora 5.x for Windows Buffer Overflow Vulnerability Steven Michaud (Aug 10)
- Re: [SNS Advisory No.55] Eudora 5.x for Windows Buffer Overflow Vulnerability Hack Hawk (Aug 06)