Eudora 5.1 allows remote attackers to bypass security warnings and possibly execute arbitrary code via attachments with names containing a trailing "." (dot).
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Link | Tags |
---|---|
http://www.securityfocus.com/bid/5432 | vdb entry exploit |
http://cert.uni-stuttgart.de/archive/bugtraq/2002/08/msg00142.html | mailing list |
http://www.eudora.com/download/eudora/windows/5.2/RelNotes.txt |