what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

ms02-021

ms02-021
Posted Apr 26, 2002

Microsoft Security Advisory MS02-021 - Outlook 2000 and 2002 provide the option to use Microsoft Word as the e-mail editor when creating and editing e-mail in either Rich-Text or HTML format. A security vulnerability exists when Outlook is configured this way and the user forwards or replies to a mail from an attacker. This could be exploited by sending a specially malformed HTML e-mail containing a script to an Outlook user who has Word enabled as the e-mail editor. If the user replied to or forwarded the e-mail, the script would then run, and be capable of taking any action the user could take. Microsoft FAQ on this issue available here.

SHA-256 | af9c8675fffa8910762ed27d32e08eb80905d4226158a10cdc3c91975f932db5

ms02-021

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----

- ----------------------------------------------------------------------
Title: E-mail Editor Flaw Could Lead to Script Execution on
Reply or Forward (Q321804)
Date: 25 April 2002
Software: Microsoft Outlook
Impact: Run Code of Attacker's Choice
Max Risk: Moderate
Bulletin: MS02-021

Microsoft encourages customers to review the Security Bulletin at:
http://www.microsoft.com/technet/security/bulletin/MS02-021.asp.
- ----------------------------------------------------------------------

Issue:
======
Outlook 2000 and 2002 provide the option to use Microsoft Word as
the e-mail editor when creating and editing e-mail in either
Rich-Text or HTML format. A security vulnerability exists when
Outlook is configured this way and the user forwards or replies
to a mail from an attacker.

The vulnerability results from a difference in the security
settings that are applied when displaying a mail versus editing
one. When Outlook displays an HTML e-mail, it applies Internet
Explorer security zone settings that disallow scripts from being
run. However, if the user replies to or forwards a mail message
and has selected Word as the e-mail editor, Outlook opens the mail
and puts the Word editor into a mode for creating e-mail
messages. Scripts are not blocked in this mode.

An attacker could exploit this vulnerability by sending a
specially malformed HTML e-mail containing a script to an Outlook
user who has Word enabled as the e-mail editor. If the user
replied to or forwarded the e-mail, the script would then run,
and be capable of taking any action the user could take.

Mitigating Factors:
====================
- The vulnerability only affects Outlook users who use Word as
their e-mail editor.

- Users who have enabled the feature introduced in Office XP SP1
to read HTML mail as plain text are not vulnerable.

- For an attacker to successfully exploit this vulnerability,
the user would need to reply to or forward the malicious e-mail.
Simply reading it would not enable the scripts to run, and the
user could delete the mail without risk.

Risk Rating:
============
- Internet systems: Low
- Intranet systems: Low
- Client systems: Moderate

Patch Availability:
===================
- A patch is available to fix this vulnerability. Please read the
Security Bulletin at
http://www.microsoft.com/technet/security/bulletin/ms02-021.asp
for information on obtaining this patch.


- ---------------------------------------------------------------------

THE INFORMATION PROVIDED IN THE MICROSOFT KNOWLEDGE BASE IS
PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND. MICROSOFT DISCLAIMS
ALL
WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING THE
WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.
IN NO EVENT
SHALL MICROSOFT CORPORATION OR ITS SUPPLIERS BE LIABLE FOR ANY
DAMAGES
WHATSOEVER INCLUDING DIRECT, INDIRECT, INCIDENTAL, CONSEQUENTIAL,
LOSS OF
BUSINESS PROFITS OR SPECIAL DAMAGES, EVEN IF MICROSOFT CORPORATION OR
ITS
SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. SOME
STATES DO
NOT ALLOW THE EXCLUSION OR LIMITATION OF LIABILITY FOR CONSEQUENTIAL
OR
INCIDENTAL DAMAGES SO THE FOREGOING LIMITATION MAY NOT APPLY.

-----BEGIN PGP SIGNATURE-----
Version: PGP 7.1

iQEVAwUBPMiceI0ZSRQxA/UrAQEAPggAhzRC6GplwMQgZzLvwjqeFbD7EVWceP4c
i2RhrpUsOsh/eKOqDXMhXklVToBbBp7mg3xFvoXdYURU6cC2XKEvIA5teFac+80b
UvtlqGc4xLLcX++Ha7NjTqZYMkvYcjhwTpTanmkJ2pARix+AzLnURFicAftFl34k
VxkZ987igMpoUM2zexEpC9dGsPAMRhXPJnn0bvk8ETQE5r+XOo5DhI3lTo3hVogC
3XzP2RCmkgdanOSfQdhddBxRhJ9Vz7FxrYG4CTtl96VxIAfvfEbJzuASVpqbMt3g
1N6wI/K4UN1qTDLoqBZplZa0x+q8FzIjd9n2IxaDUtu2dkxhVIfBGQ==
=TxYz
-----END PGP SIGNATURE-----

Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close