SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (E-mail Client)  >   Microsoft Outlook Vendors:   Microsoft
Microsoft Outlook Bug in Processing Malformed E-mail Headers Lets Remote Users Crash the Client
SecurityTracker Alert ID:  1005757
SecurityTracker URL:  http://securitytracker.com/id/1005757
CVE Reference:   CVE-2002-1255   (Links to External Site)
Date:  Dec 4 2002
Impact:   Denial of service via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 2002
Description:   A vulnerability was reported in Microsoft Outlook. A remote user can send e-mail to cause the client to crash.

It is reported that a remote user can create and send an e-mail with a specially crafted header to a target user to cause the target user's Outlook 2002 e-mail client to crash. According to the report, the client will continue to crash as long as the malicious e-mail message remains on the e-mail server.

An administrator must delete the affected message or the user must delete the affected message using a different e-mail client to get the Outlook client to return to normal operations.

The flaw is reported to exist in code that converts the e-mail message to the MAPI format.

Microsoft reports that Outlook 98, Outlook 2000, and Outlook Express are not vulnerable.

Microsoft credits Richard Lawley for reporting this flaw.

Impact:   A remote user can cause a target user's Outlook 2002 e-mail client to crash.
Solution:   The vendor has released the following patch for Microsoft Outlook 2002:

http://office.microsoft.com/downloads/2002/olk1005.aspx

This patch can reportedly be applied to Office XP SP2. Microsoft plans to include this fix in any future Service Packs for Office XP.

Microsoft also plans to release Knowledge Base article 331866 regarding this issue, to be available shortly on the Microsoft Online Support web site at:

http://support.microsoft.com/?scid=fh;en-us;kbhowto

Vendor URL:  www.microsoft.com/technet/security/bulletin/MS02-067.asp (Links to External Site)
Cause:   Exception handling error
Underlying OS:  Windows (Any)

Message History:   None.


 Source Message Contents

Subject:  Microsoft Security Bulletin MS02-067: E-mail Header Processing Flaw Could Cause Outlook 2002 to Fail (331866)


-----BEGIN PGP SIGNED MESSAGE-----

- ----------------------------------------------------------------------
Title:      E-mail Header Processing Flaw Could Cause Outlook 2002
            to Fail (331866)
Date:       04 December 2002
Software:   Microsoft Outlook 2002
Impact:     Denial of Service
Max Risk:   Moderate
Bulletin:   MS02-067

Microsoft encourages customers to review the Security Bulletins at: 
http://www.microsoft.com/technet/security/bulletin/MS02-067.asp
http://www.microsoft.com/security/security_bulletins/MS02-067.asp
- ----------------------------------------------------------------------

Issue:
======
Microsoft Outlook provides users with the ability to work with
e-mail, contacts, tasks, and appointments. Outlook e-mail handling
includes receiving, displaying, creating, editing, sending, and
organizing e-mail messages. When working with received e-mail
messages, Outlook processes information contained in the header of
the e-mail which carries information about where the e-mail came
from, its destination, and attributes of the message.

A vulnerability exists in Outlook 2002 in its processing of e-mail
header information. An attacker who successfully exploited the
vulnerability could send a specially malformed e-mail to a user of
Outlook 2002 that would cause the Outlook client to fail under
certain circumstances. The Outlook 2002 client would continue to
fail so long as the specially malformed e-mail message remained on
the e-mail server. The e-mail message could be deleted by an e-mail
administrator, or by the user via another e-mail client such as
Outlook Web Access or Outlook Express, after which point the
Outlook 2002 client would again function normally.

Mitigating Factors:
====================
 - Outlook 2002 clients connecting to e-mail servers using the
   MAPI protocol are not affected. Only Outlook 2002 clients using
   POP3, IMAP, or WebDAV protocols are vulnerable.

 - The vulnerability does not affect Outlook 2000 or Outlook Express.

 - The vulnerability is a denial of service vulnerability only.
   The attacker would not be able to access the user?s e-mail or
   system in any way. The vulnerability could not be used to read,
   delete, create, or alter the user?s e-mail. 

 - If an attacker was able to send a specially malformed e-mail that
   successfully exploited this vulnerability, the specially
   malformed e-mail could be deleted either by an e-mail
   administrator, or by the user via another e-mail client such as
   Outlook Web Access or Outlook Express. Once the specially
   malformed e-mail has been removed, normal operation would resume.

Risk Rating:
============
 - Moderate

Patch Availability:
===================
 - A patch is available to fix this vulnerability. Please read the 
   Security Bulletin at
   http://www.microsoft.com/technet/security/bulletin/ms02-067.asp
   for information on obtaining this patch.

Acknowledgment:
===============
 - Richard Lawley

- ---------------------------------------------------------------------

THE INFORMATION PROVIDED IN THE MICROSOFT KNOWLEDGE BASE IS PROVIDED
"AS IS" WITHOUT WARRANTY OF ANY KIND. MICROSOFT DISCLAIMS ALL 
WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING THE WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. IN NO EVENT 
SHALL MICROSOFT CORPORATION OR ITS SUPPLIERS BE LIABLE FOR ANY
DAMAGES WHATSOEVER INCLUDING DIRECT, INDIRECT, INCIDENTAL,
CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR SPECIAL DAMAGES, EVEN IF
MICROSOFT CORPORATION OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE
POSSIBILITY OF SUCH DAMAGES. SOME STATES DO NOT ALLOW THE EXCLUSION
OR LIMITATION OF LIABILITY FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES
SO THE FOREGOING LIMITATION MAY NOT APPLY.

-----BEGIN PGP SIGNATURE-----
Version: PGP 7.1

iQEVAwUBPe5ejo0ZSRQxA/UrAQGGCwf/fCc/EakgoYYoT0CHxlWV/0xGi7N6/Dr6
d/eEhu8fYujZ2flicJOGD96wOBqhTJoabMNzMQVLQMswgRvvVLewnXolR6EhdGTN
AX+XuNYizNOdhJuc5GYHmOl6K9Dr3DnBObXXBf0YqDcdmHssx8XJ5sHKcf/eP/6K
t9HevpcNOamjtT20rvu0mcKkrFxb5uwGXWfFl+nHW7faPOp56JTyoKHkQjtLiq1c
33TeDGJOz3Gm6uLZU0juJ9UyNh0GqN2UqjrYn7sMRTOR1si0O/Qr16ZV6rD8Rhn8
V6pH36kXsj7CRVkYlXkEaFnmohy9fghkXTPLTG/DBxqupoI923ywhg==
=S3ww
-----END PGP SIGNATURE-----


*******************************************************************

You have received this e-mail bulletin because of your subscription to the Microsoft Product Security Notification Service.  For more
 information on this service, please visit http://www.microsoft.com/technet/security/notify.asp.
 
To verify the digital signature on this bulletin, please download our PGP key at http://www.microsoft.com/technet/security/notify.asp.
 
To unsubscribe from the Microsoft Security Notification Service, please visit the Microsoft Profile Center at http://register.microsoft.com/regsys/pic.asp
 
 
If you do not wish to use Microsoft Passport, you can unsubscribe from the Microsoft Security Notification Service via email as described
 below:
Reply to this message with the word UNSUBSCRIBE in the Subject line.
 
For security-related information about Microsoft products, please visit the Microsoft Security Advisor web site at http://www.microsoft.com/security.

 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, SecurityGlobal.net LLC