Rule

--
Sid
11669

--
Summary:
This event is generated when an attempt is made to exploit a known vulnerability in Eudora.

--
Impact:
High

--
Detailed Information:
Stack-based buffer overflow in Eudora 7.1 allows user-assisted, remote SMTP servers to execute arbitrary code via a long SMTP reply.  NOTE: the user must click through a warning about a possible buffer overflow exploit to trigger this issue.

--
Affected Systems:
Qualcomm Eudora 7.1

--
Attack Scenarios:


--
Ease of Attack:


--
False Positives:
None known.

--
False Negatives:
None known.

--
Corrective Action:


--
Contributors:
Sourcefire Vulnerability Research Team
This document was generated from data supplied by the National Vulnerability Database. A product of the National Institute of Standards and Technology.
For more information see http://nvd.nist.gov/

--
Additional References:

--
