Overview
A vulnerability exists in an ActiveX control supplied with Microsoft Outlook 2002 that could allow malicious code on a web page or in an HTML email message to manipulate Outlook data or execute arbitrary code as the user running Outlook.
Description
Microsoft Outlook 2002 installs an ActiveX control called 'Microsoft Outlook View Control'. Microsoft Outlook (and the Outlook View Control) may be installed as part of Microsoft Office. In addition, the Outlook View Control is independently available for download from Microsoft. Outlook Express is also vulnerable if the Outlook View Control is present on the system. The Outlook View Control provides access to Outlook data such as email, contacts, and calendar information. The control should provide read-only access to Outlook data, but in reality it exposes programming elements that allow the manipulation of Outlook data and, more importantly, the execution of arbitrary code with the privileges of the user running Outlook. To exploit this vulnerability, an attacker might convince a user to visit a web page or open an HTML email message containing malicious script code that invokes the control. The control is implemented in Outlook 2002 in the file OUTLCTL.DLL and independently in OUTLCTLX.DLL and is referenced by its class identifier (CLSID): 0006F063-0000-0000-C000-000000000046. |
Impact
In Outlook 2002, arbitrary code can be executed with the privileges of the user running Outlook. Also, email, calendar, and contact information accessible via Outlook can be read, modified, and/or deleted. In previous versions of Outlook, a user's folder view may be manipulated. According to Microsoft Security Bulletin MS01-038: "In an Outlook 2002 client, this [vulnerability] could enable an attacker to delete mail, change calendar information, or take virtually any other action, including running arbitrary code on the user's machine. In contrast, in Outlook 98 and 2000 the attacker could use the control to manipulate the user's folder view, but could not use it to read, change or delete data, or to run code on the user's machine." |
Solution
Apply Patch |
To further protect against malicious code contained in email, install the Outlook Security Update and the Java Permissions Security update. |
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
References
- http://www.guninski.com/vv2xp.html
- http://www.guninski.com/signedactivex2.html
- http://www.ntbugtraq.com/default.asp?pid=36&sid=1&A2=ind0107&L=ntbugtraq&F=P&S=&P=862
- http://www.securityfocus.com/bid/3025
- http://www.securitytracker.com/alerts/2001/Jul/1001987.html
- http://www.microsoft.com/technet/security/bulletin/ms01-038.asp
- http://support.microsoft.com/support/kb/articles/Q291/4/07.ASP
- http://support.microsoft.com/support/kb/articles/Q291/7/91.asp
- http://support.microsoft.com/?scid=/support/kb/articles/q303/8/33.asp
- http://support.microsoft.com/?scid=/support/kb/articles/q303/8/35.asp
- http://support.microsoft.com/default.aspx?scid=KB;EN-US;q240797
- http://www.ecma-international.org/publications/standards/ECMA-262.HTM
Acknowledgements
The CERT Coordination Center thanks Georgi Guninski, Russ Cooper of TrueSecure/NTBugTraq, and Microsoft Product Security for information used in this document.
This document was written by Art Manion.
Other Information
CVE IDs: | CVE-2001-0538 |
Severity Metric: | 10.24 |
Date Public: | 2001-07-12 |
Date First Published: | 2001-08-02 |
Date Last Updated: | 2003-06-17 17:58 UTC |
Document Revision: | 85 |