Overview
There is an MHTML input validation vulnerability in Outlook Express that may lead to arbitrary command and code execution in the Local Computer Zone of a victim host.
Description
Microsoft systems use components of Microsoft Outlook Express to render MHTML (MIME Encapsulation of Aggregate HTML) when viewing files. Internet Explorer also relies on the MHTML rendering engine in Outlook Express when displaying web pages. The MHTML rendering engine in Outlook Express does not validate the type of file being processed. This may lead to web script executing in the Local Computer Zone, which may give remote attackers control of victim systems. |
Impact
By exploiting this vulnerability, an attacker may be able to launch programs on a victim's computer in the Local Computer Zone. If an attacker can guess, discover, or know the file path of programs already installed on a victim computer, he may be able to execute arbitrary commands. Additionally, if an attacker can access files he may have downloaded to a victim system, he would be able to execute arbitrary code. |
Solution
Apply patches for Outlook Express found in MS03-014. |
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
References
- http://www.microsoft.com/technet/security/bulletin/MS03-014.asp
- http://support.microsoft.com/?id=330994
- http://www.microsoft.com/technet/security/bulletin/MS03-004.asp
- http://www.securityfocus.com/bid/5473
- http://www.securityfocus.com/bid/6961
- http://www.microsoft.com/windows/ie/downloads/critical/330994/default.asp
Acknowledgements
http-equiv@malware.com has been acknowledged as the discoverer of this vulnerability.
This document was written by Jeffrey S. Havrilla.
Other Information
CVE IDs: | CVE-2002-0980 |
Severity Metric: | 37.80 |
Date Public: | 2003-05-01 |
Date First Published: | 2003-08-02 |
Date Last Updated: | 2003-08-12 15:55 UTC |
Document Revision: | 19 |