From: GP <[EMAIL PROTECTED]>
How the "Stealth Attachment" trick works
[EMAIL PROTECTED]
================================================
Exploit:
Grants a remote user the ability to run arbitrary code on your computer by
sending you an email message containing an http:// link, if you read the
message using Eudora mail and click on the link.
Requirements:
The remote user must know that you are using Eudora. If you have ever sent
them mail, they will have this information since messages sent with Eudora
include an X-Mailer header like:
X-Mailer: QUALCOMM Windows Eudora Pro Version 4.2.0.58
The remote user must know the full path to the directory where your
attachments are extracted to. This is easy to guess since it is usually
either:
C:\Eudora\Attach\
for version 3.x, or
C:\Program Files\Qualcomm\Eudora Pro\Attach\
for Eudora Pro version 4.x, or
C:\Program Files\Qualcomm\Eudora\Attach\
for Eudora 4.3 or later. (Beginning with version 4.3, Eudora Light and
Eudora Pro were merged into one version; Eudora 4.3 can operate either in
"free mode" and display advertisements, or in "paid mode" without the ads
if you pay a registration fee.) Because the remote user can see the version
number as part of the X-Mailer header, it is possible to guess where the
attachments directory is likely to be located.
How it works
The key vulnerability in Eudora is that it does not warn you if you click
on a link pointing to a .lnk file. (This is the file extension for Windows
shortcut files -- normally this extension is not visible in Windows
Explorer, even if you have Windows Explorer set to "display file extensions
for known file types".) Eudora already warns you if you click on a link to
a file with the extension .exe, .com, or .bat. -- but it does not warn you
about .lnk files. So a simple way of exploiting this would be to send the
user two attachments:
� an .exe file, e.g. "spy.exe"
� a .lnk file, e.g. "spy.lnk", that pointed to
C:\Eudora\Attach\spy.exe
(this is the reason why you need to know the directory where the
recipient's attachments are extracted to)
By itself, this trick would not be very useful. A naive user might click on
an attached .lnk file, and Eudora wouldn't warn them -- but a more
experienced user would probably realize that there was something suspicious
about a .lnk file sent to them by email.
For the trick be more effective, the user should think that they are
clicking on a link in a Eudora mail message. When a message containing an
http:// URL is displayed in Eudora, the URL is automatically made into a
hyperlink, so that you can click on the URL and it will load into your
default browser:
http://www.cnn.com/2000/ALLPOLITICS/stories/04/26/hrc.townhall/
If the recipient is using Eudora, though, you can send them an HTML email
message formatted so that the link looks like it points one place, but
really points somewhere else. The following HTML:
<a href="file:///c:/eudora/attach/spy.lnk"
>http://www.cnn.com/2000/ALLPOLITICS/stories/04/26/hrc.townhall/</a>
will be rendered in a Eudora email message as:
http://www.cnn.com/2000/ALLPOLITICS/stories/04/26/hrc.townhall/
When the user views this message, it looks exactly as if someone has
emailed them a plain-text email with a link in it. (In order to look
"exactly like plain text email", of course, the message should not contain
any HTML features like fonts or styled text.) When the user clicks on the
link, the shortcut "spy.lnk" will be launched, causing the program
"spy.exe" to run. (For the user not to notice anything suspicious, the
"spy.exe" program should be invisible, and should also cause the URL
http://www.cnn.com/2000/ALLPOLITICS/stories/04/26/hrc.townhall/
to open in the user's browser, which is what the user is expecting.)
Lastly, for the trick to be effective, the user should not see any
reference to the attachments that were sent with the message. (By default,
Eudora displays attachments in the message body with an icon and the line
"Attachment converted:".) To hide the attachment icons, insert the lines
around the attachments in the message. This way, the user will not see any
reference to an extracted .exe or .lnk file, and the message will look
exactly like a normal plain text message containing an http:// link.
Recommended fix
QUALCOMM recommends that users edit their Eudora.ini file and add the
following line:
WarnLaunchExtensions=exe|com|bat|cmd|pif|htm|do|xl|reg|lnk|
to their "[Settings]" section. (The default is to warn for all of these
extensions except the "lnk" one.) Note the trailing "|" on the end -- this
is necessary in order for Eudora to warn for "lnk" files, but the extra "|"
can be confusing to users who intuitively understand "|" to mean "or" -- in
which case it looks like the trailing "|" should not be necessary, but it's
required by the Eudora parser.
Qualcomm has said that the next version of Eudora will warn for .lnk files
as well by default.
--
Garind P
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
"oc ur mobo not urself or anybody else"
--
Compu-Mania MailingList, provided by PT Centrin Utama
Unsubscribe: [EMAIL PROTECTED], body: unsubscribe Compu-Mania
Archive: http://www.mail-archive.com/[email protected]/
Info: [EMAIL PROTECTED], body: help