Vulnerability Development mailing list archives

Re: jump2.eudora.com


From: Erik Tayler <nine () 14x net>
Date: Mon, 28 Aug 2000 17:12:50 -0500

I'm sure Eudora isn't making your computer do strange and unauthorized
operations. Contacting the people at eudora.com would probably be a better
way to go, rather than messing with things. Since the connections to
jump2.eudora.com aren't "stealth-like" or covert, people shouldn't jump the
gun and think Eudora is gathering a huge database of client information,
such as Real Media had done. Anyway, just my two cents.

Erik Tayler
14x Network Security
http://www.14x.net

----- Original Message -----
From: "Brad Griffin" <b.griffin () CQU EDU AU>
To: <VULN-DEV () SECURITYFOCUS COM>
Sent: Monday, August 28, 2000 4:15 PM
Subject: Re: jump2.eudora.com


Hi folks.
You may find that the simplest 'Windows' way of blocking this is to add
jump2.eudora.com to your hosts file and reference it to 127.0.0.1
Eudora will *think* it has connected to jump2, but won't find what it's
looking for and will give up.
Just a thought,
Cheers,
Gryph
-----Original Message-----
From: VULN-DEV List [mailto:VULN-DEV () SECURITYFOCUS COM]On Behalf Of Matt
Zimmerman
Sent: Monday, August 28, 2000 2:12 PM
To: VULN-DEV () SECURITYFOCUS COM
Subject: Re: jump2.eudora.com


On Sun, Aug 27, 2000 at 04:32:58PM -0400, William Daskaluk wrote:


- The OS and version running on the origin host
- The version of Eudora running on the origin host
- The fact that the origin host is probably used for reading mail
- A hint that the origin host is probably a single-user system (where
security
  tends to be weaker)

Probably harmless in most situations, but there should be an option to
disable
this check for the benefit of security-paranoid and privacy-conscious
users.

--
 - mdz



Current thread: