Computer Security
[EN] securityvulns.ru no-pyccku


Related information

  Дырка в Outlook при работе с бизнесс-картами.

  Security Advisory: Microsoft Outlook 2000 vCard Buffer Overrun (additional information)  - Revised

  vCard DoS on Outlook 2000

From:MICROSOFT <secure_(at)_microsoft.com>
Date:23.02.2001
Subject:Security Bulletin MS01-012

- ----------------------------------------------------------------------
Title:      Outlook, Outlook Express Vcard Handler Contains
           Unchecked Buffer
Date:       22 February 2001
Software:   Outlook, Outlook Express
Impact:     Run code of attacker's choice
Bulletin:   MS01-012

Microsoft encourages customers to review the Security Bulletin at:
http://www.microsoft.com/technet/security/bulletin/MS01-012.asp.
- ----------------------------------------------------------------------

Issue:
======
Outlook Express provides several components that are used both by it
and Outlook, if Outlook is installed on the machine.  One such
component, used to process vCards, contains an unchecked buffer.

By creating a vCard and editing it to contain specially chosen data,
then sending it to another user, an attacker could cause  either of
two effects to occur if the recipient opened it. In the less serious
case, the attacker could cause the mail client  to fail.  If this
happened, the recipient could resume normal operation by restarting
the mail client and deleting the  offending mail. In the more serious
case, the attacker could cause the mail client to run code of her
choice on the user's  machine. Such code could take any desired
action, limited only by the permissions of the recipient on the
machine.

Because the component that contains the flaw ships as part of OE,
which itself ships as part of IE, the patch is specified in  terms of
the version of IE rather than OE or Outlook.

Mitigating Factors:
====================
- There is no means by which a Vcard could be made to open
  automatically.


Patch Availability:
===================
- A patch is available to fix this vulnerability. Please read the
  Security Bulletin
  http://www.microsoft.com/technet/security/bulletin/ms01-012.asp
  for information on obtaining this patch.

Acknowledgment:
===============
- Ollie Whitehouse of @Stake (www.atstake.com)

- ---------------------------------------------------------------------

THE INFORMATION PROVIDED IN THE MICROSOFT KNOWLEDGE BASE IS PROVIDED
"AS IS" WITHOUT WARRANTY OF ANY KIND. MICROSOFT DISCLAIMS ALL
WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING THE WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. IN NO EVENT
SHALL MICROSOFT CORPORATION OR ITS SUPPLIERS BE LIABLE FOR ANY
DAMAGES WHATSOEVER INCLUDING DIRECT, INDIRECT, INCIDENTAL,
CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR SPECIAL DAMAGES, EVEN IF
MICROSOFT CORPORATION OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE
POSSIBILITY OF SUCH DAMAGES. SOME STATES DO NOT ALLOW THE EXCLUSION
OR LIMITATION OF LIABILITY FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES SO
THE FOREGOING LIMITATION MAY NOT APPLY.

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod