|
|
|
Microsoft Outlook Bug in Processing Malformed E-mail Headers Lets Remote Users Crash the Client
|
SecurityTracker Alert ID: 1005757 |
SecurityTracker URL: http://securitytracker.com/id/1005757
|
CVE Reference:
CVE-2002-1255
(Links to External Site)
|
Date: Dec 4 2002
|
Impact:
Denial of service via network
|
Fix Available: Yes Vendor Confirmed: Yes
|
Version(s): 2002
|
Description:
A vulnerability was reported in Microsoft Outlook. A remote user can send e-mail to cause the client to crash.
It is reported that a remote user can create and send an e-mail with a specially crafted header to a target user to cause the target user's Outlook 2002 e-mail client to crash. According to the report, the client will continue to crash as long as the malicious e-mail message remains on the e-mail server.
An administrator must delete the affected message or the user must delete the affected message using a different e-mail client to get the Outlook client to return to normal operations.
The flaw is reported to exist in code that converts the e-mail message to the MAPI format.
Microsoft reports that Outlook 98, Outlook 2000, and Outlook Express are not vulnerable.
Microsoft credits Richard Lawley for reporting this flaw.
|
Impact:
A remote user can cause a target user's Outlook 2002 e-mail client to crash.
|
Solution:
The vendor has released the following patch for Microsoft Outlook 2002:
http://office.microsoft.com/downloads/2002/olk1005.aspx
This patch can reportedly be applied to Office XP SP2. Microsoft plans to include this fix in any future Service Packs for Office XP.
Microsoft also plans to release Knowledge Base article 331866 regarding this issue, to be available shortly on the Microsoft Online Support web site at:
http://support.microsoft.com/?scid=fh;en-us;kbhowto
|
Vendor URL: www.microsoft.com/technet/security/bulletin/MS02-067.asp (Links to External Site)
|
Cause:
Exception handling error
|
Underlying OS: Windows (Any)
|
|
Message History:
None.
|
Source Message Contents
|
Subject: Microsoft Security Bulletin MS02-067: E-mail Header Processing Flaw Could Cause Outlook 2002 to Fail (331866)
|
-----BEGIN PGP SIGNED MESSAGE-----
- ----------------------------------------------------------------------
Title: E-mail Header Processing Flaw Could Cause Outlook 2002
to Fail (331866)
Date: 04 December 2002
Software: Microsoft Outlook 2002
Impact: Denial of Service
Max Risk: Moderate
Bulletin: MS02-067
Microsoft encourages customers to review the Security Bulletins at:
http://www.microsoft.com/technet/security/bulletin/MS02-067.asp
http://www.microsoft.com/security/security_bulletins/MS02-067.asp
- ----------------------------------------------------------------------
Issue:
======
Microsoft Outlook provides users with the ability to work with
e-mail, contacts, tasks, and appointments. Outlook e-mail handling
includes receiving, displaying, creating, editing, sending, and
organizing e-mail messages. When working with received e-mail
messages, Outlook processes information contained in the header of
the e-mail which carries information about where the e-mail came
from, its destination, and attributes of the message.
A vulnerability exists in Outlook 2002 in its processing of e-mail
header information. An attacker who successfully exploited the
vulnerability could send a specially malformed e-mail to a user of
Outlook 2002 that would cause the Outlook client to fail under
certain circumstances. The Outlook 2002 client would continue to
fail so long as the specially malformed e-mail message remained on
the e-mail server. The e-mail message could be deleted by an e-mail
administrator, or by the user via another e-mail client such as
Outlook Web Access or Outlook Express, after which point the
Outlook 2002 client would again function normally.
Mitigating Factors:
====================
- Outlook 2002 clients connecting to e-mail servers using the
MAPI protocol are not affected. Only Outlook 2002 clients using
POP3, IMAP, or WebDAV protocols are vulnerable.
- The vulnerability does not affect Outlook 2000 or Outlook Express.
- The vulnerability is a denial of service vulnerability only.
The attacker would not be able to access the user?s e-mail or
system in any way. The vulnerability could not be used to read,
delete, create, or alter the user?s e-mail.
- If an attacker was able to send a specially malformed e-mail that
successfully exploited this vulnerability, the specially
malformed e-mail could be deleted either by an e-mail
administrator, or by the user via another e-mail client such as
Outlook Web Access or Outlook Express. Once the specially
malformed e-mail has been removed, normal operation would resume.
Risk Rating:
============
- Moderate
Patch Availability:
===================
- A patch is available to fix this vulnerability. Please read the
Security Bulletin at
http://www.microsoft.com/technet/security/bulletin/ms02-067.asp
for information on obtaining this patch.
Acknowledgment:
===============
- Richard Lawley
- ---------------------------------------------------------------------
THE INFORMATION PROVIDED IN THE MICROSOFT KNOWLEDGE BASE IS PROVIDED
"AS IS" WITHOUT WARRANTY OF ANY KIND. MICROSOFT DISCLAIMS ALL
WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING THE WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. IN NO EVENT
SHALL MICROSOFT CORPORATION OR ITS SUPPLIERS BE LIABLE FOR ANY
DAMAGES WHATSOEVER INCLUDING DIRECT, INDIRECT, INCIDENTAL,
CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR SPECIAL DAMAGES, EVEN IF
MICROSOFT CORPORATION OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE
POSSIBILITY OF SUCH DAMAGES. SOME STATES DO NOT ALLOW THE EXCLUSION
OR LIMITATION OF LIABILITY FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES
SO THE FOREGOING LIMITATION MAY NOT APPLY.
-----BEGIN PGP SIGNATURE-----
Version: PGP 7.1
iQEVAwUBPe5ejo0ZSRQxA/UrAQGGCwf/fCc/EakgoYYoT0CHxlWV/0xGi7N6/Dr6
d/eEhu8fYujZ2flicJOGD96wOBqhTJoabMNzMQVLQMswgRvvVLewnXolR6EhdGTN
AX+XuNYizNOdhJuc5GYHmOl6K9Dr3DnBObXXBf0YqDcdmHssx8XJ5sHKcf/eP/6K
t9HevpcNOamjtT20rvu0mcKkrFxb5uwGXWfFl+nHW7faPOp56JTyoKHkQjtLiq1c
33TeDGJOz3Gm6uLZU0juJ9UyNh0GqN2UqjrYn7sMRTOR1si0O/Qr16ZV6rD8Rhn8
V6pH36kXsj7CRVkYlXkEaFnmohy9fghkXTPLTG/DBxqupoI923ywhg==
=S3ww
-----END PGP SIGNATURE-----
*******************************************************************
You have received this e-mail bulletin because of your subscription to the Microsoft Product Security Notification Service. For more
information on this service, please visit http://www.microsoft.com/technet/security/notify.asp.
To verify the digital signature on this bulletin, please download our PGP key at http://www.microsoft.com/technet/security/notify.asp.
To unsubscribe from the Microsoft Security Notification Service, please visit the Microsoft Profile Center at http://register.microsoft.com/regsys/pic.asp
If you do not wish to use Microsoft Passport, you can unsubscribe from the Microsoft Security Notification Service via email as described
below:
Reply to this message with the word UNSUBSCRIBE in the Subject line.
For security-related information about Microsoft products, please visit the Microsoft Security Advisor web site at http://www.microsoft.com/security.
|
|
Go to the Top of This SecurityTracker Archive Page
|