First published: Thu May 06 2004(Updated: )
Buffer overflow in Eudora for Windows 5.2.1, 6.0.3, and 6.1 allows remote attackers to execute arbitrary code via an e-mail with (1) a link to a long URL to the C drive or (2) a long attachment name.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Eudora | =5.2.1 | |
Eudora | =6.0 | |
Eudora | =6.0.1 | |
Eudora | =6.0.3 | |
Eudora | =6.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2004-2005 is classified as a moderate severity vulnerability due to its potential for remote code execution.
To fix CVE-2004-2005, users should upgrade to a patched version of Eudora, specifically 6.1.1 or later.
CVE-2004-2005 allows attackers to exploit a buffer overflow via specially crafted emails with long URLs or attachment names.
CVE-2004-2005 affects Eudora versions 5.2.1, 6.0, 6.0.1, 6.0.3, and 6.1.
CVE-2004-2005 is a remote vulnerability, allowing exploitation through malicious emails.