Microsoft Outlook和Outlook Express远程任意程序执行漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1107219 漏洞类型 权限许可和访问控制
发布时间 2003-02-24 更新时间 2003-12-31
CVE编号 CVE-2003-1378 CNNVD-ID CNNVD-200312-277
漏洞平台 Windows CVSS评分 8.8
|漏洞来源
https://www.exploit-db.com/exploits/22280
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200312-277
|漏洞详情
MicrosoftOutlook和OutlookExpress是流行的邮件客户端。MicrosoftOutlook和OutlookExpress在处理HTML形式邮件时存在问题,远程攻击者可以利用这个漏洞通过发送嵌入对象的HTML邮件使目标用户的Outlook执行任意命令。当一个邮件消息或新闻组消息通过Outlook查看的时候,会在InternetExplore缓冲区中建立临时对象,而这个缓冲区的安全区域由IE来设置,并且默认设置为Internet区域。攻击者可以把对象嵌入到HTML消息中通过使用CODEBAS引用和非零CLASSID值来引用一个可执行文件。攻击者也可以通过把文件放置在临时文件夹中并通过这个方法来执行。
|漏洞EXP
source: http://www.securityfocus.com/bid/6923/info

Microsoft Outlook and Outlook Express may execute arbitrary programs through objects embedded in HTML email messages. When an email message or newsgroup message is viewed using Outlook, a temporary object is created in the Internet Explorer cache. The security zone of this cache should be set by Internet Explorer and is set to the Internet Zone by default.

It is possible to have an object embedded in an HTML message reference an executable file using a CODEBASE reference and non-zero CLASSID value. It may also be possible for an attacker to place a file in a known temporary folder and have it executed through this method.

An issue similar to this was reported for Internet Explorer (BID 3867). It appears that the issue was fixed for objects viewed in a web page through Internet Explorer, but not through HTML email viewed with Outlook or Outlook Express. 

<xml id=oExec> <security><exploit> <![CDATA[ <object id="oFile"
classid="clsid:11111111-1111-1111-1111"
code base="C:WINDOWSFTP.EXE"></object>]]></exploit></security></xml>
<SPAN dataFld=exploit dataFormatAs=html
dataSrc=#oExec></SPAN>
|参考资料

来源:XF
名称:outlook-codebase-execute-programs(11411)
链接:http://xforce.iss.net/xforce/xfdb/11411
来源:BID
名称:6923
链接:http://www.securityfocus.com/bid/6923
来源:BUGTRAQ
名称:20030224Re:OUTLOOKEXPRESS6.00:broken
链接:http://www.securityfocus.com/archive/1/312929
来源:BUGTRAQ
名称:20030223OUTLOOKEXPRESS6.00:broken
链接:http://www.securityfocus.com/archive/1/312910
来源:NSFOCUS
名称:4455
链接:http://www.nsfocus.net/vulndb/4455