Executive Summary
Summary | |
---|---|
Title | Cumulative Security Update for Outlook Express and Windows Mail (929123) |
Informations | |||
---|---|---|---|
Name | MS07-034 | First vendor Publication | 2007-06-12 |
Vendor | Microsoft | Last vendor Modification | 2007-06-12 |
Severity (Vendor) | Critical | Revision | N/A |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:M/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 9.3 | Attack Range | Network |
Cvss Impact Score | 10 | Attack Complexity | Medium |
Cvss Expoit Score | 8.6 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
This critical security update resolves two privately reported and two publicly disclosed vulnerabilities. One of these vulnerabilities could allow remote code execution if a user viewed a specially crafted e-mail using Windows Mail in Windows Vista. The other vulnerabilities could allow information disclosure if a user visits a specially crafted Web page using Internet Explorer and cannot be exploited directly in Outlook Express. For the information disclosure vulnerabilities, users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. |
Original Source
Url : http://www.microsoft.com/technet/security/bulletin/ms07-034.mspx?pubDate=2 (...) |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-200 | Information Exposure |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:1605 | |||
Oval ID: | oval:org.mitre.oval:def:1605 | ||
Title: | URL Redirect Cross Domain Information Disclosure Vulnerability | ||
Description: | A component in Microsoft Outlook Express 6 allows remote attackers to bypass domain restrictions and obtain sensitive information via redirections with the mhtml: URI handler, as originally reported for Internet Explorer 6 and 7, aka "URL Redirect Cross Domain Information Disclosure Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2006-2111 | Version: | 4 |
Platform(s): | Microsoft Windows 2000 Microsoft Windows XP Microsoft Windows Server 2003 | Product(s): | Microsoft Outlook Express |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:1861 | |||
Oval ID: | oval:org.mitre.oval:def:1861 | ||
Title: | Windows Mail UNC Navigation Request Remote Code Execution Vulnerability | ||
Description: | Windows Mail in Microsoft Windows Vista might allow user-assisted remote attackers to execute certain programs via a link to a (1) local file or (2) UNC share pathname in which there is a directory with the same base name as an executable program at the same level, as demonstrated using C:/windows/system32/winrm (winrm.cmd) and migwiz (migwiz.exe). | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2007-1658 | Version: | 3 |
Platform(s): | Microsoft Windows Vista | Product(s): | Windows Mail |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:2045 | |||
Oval ID: | oval:org.mitre.oval:def:2045 | ||
Title: | URL Parsing Cross Domain Information Disclosure Vulnerability | ||
Description: | A component in Microsoft Outlook Express 6 and Windows Mail in Windows Vista does not properly handle certain HTTP headers when processing MHTML protocol URLs, which allows remote attackers to obtain sensitive information from other Internet Explorer domains, aka "URL Parsing Cross Domain Information Disclosure Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2007-2225 | Version: | 3 |
Platform(s): | Microsoft Windows 2000 Microsoft Windows XP Microsoft Windows Server 2003 | Product(s): | Microsoft Outlook Express |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:2085 | |||
Oval ID: | oval:org.mitre.oval:def:2085 | ||
Title: | Content Disposition Parsing Cross Domain Information Disclosure Vulnerability | ||
Description: | The MHTML protocol handler in Microsoft Outlook Express 6 and Windows Mail in Windows Vista does not properly handle Content-Disposition "notifications," which allows remote attackers to obtain sensitive information from other Internet Explorer domains, aka "Content Disposition Parsing Cross Domain Information Disclosure Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2007-2227 | Version: | 3 |
Platform(s): | Microsoft Windows 2000 Microsoft Windows XP Microsoft Windows Server 2003 | Product(s): | Microsoft Outlook Express |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Application | 1 | |
Application | 1 | |
Os | 5 |
OpenVAS Exploits
Date | Description |
---|---|
2011-01-14 | Name : Microsoft Outlook Express/Windows Mail MHTML URI Handler Information Disclosu... File : nvt/gb_ms07-034.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
35346 | Microsoft Outlook Express / Windows Mail MHTML Content Disposition Parsing Cr... |
35345 | Microsoft Outlook Express / Windows Mail URL Parsing Cross Domain Information... |
34102 | Microsoft Windows Vista Mail Client Crafted Link Arbitrary Program Execution |
25073 | Microsoft IE mhtml: Redirection Domain Restriction Bypass Internet Explorer contains a flaw that may allow a malicious user to access documents served from another web site. The issue is caused due to an error in the handling of redirections for URLs with the "mhtml:" URI handler. It is possible that the flaw may allow a malicious website to access properties of a site in an arbitrary external domain in the context of the victim user's browser resulting in a loss of confidentiality. |
Information Assurance Vulnerability Management (IAVM)
Date | Description |
---|---|
2007-06-14 | IAVM : 2007-B-0011 - Multiple Vulnerabilities in Microsoft Outlook Express and Windows Mail Severity : Category II - VMSKEY : V0014354 |
Snort® IPS/IDS
Date | Description |
---|---|
2014-11-16 | Microsoft Windows Mail file execution attempt RuleID : 31650 - Revision : 2 - Type : SERVER-MAIL |
2014-01-10 | Microsoft Windows Vista Windows mail file execution attempt RuleID : 16023 - Revision : 6 - Type : FILE-EXECUTABLE |
2014-01-10 | Microsoft Windows Vista Windows mail file execution attempt RuleID : 16022 - Revision : 14 - Type : FILE-EXECUTABLE |
2014-01-10 | Microsoft Windows Mail file execution attempt RuleID : 11837 - Revision : 13 - Type : SERVER-MAIL |
2014-01-10 | Microsoft Direct Speech Recognition ActiveX function call unicode access RuleID : 11833 - Revision : 8 - Type : WEB-ACTIVEX |
2014-01-10 | Microsoft Direct Speech Recognition ActiveX function call access RuleID : 11832 - Revision : 11 - Type : BROWSER-PLUGINS |
2014-01-10 | Microsoft Direct Speech Recognition ActiveX clsid unicode access RuleID : 11831 - Revision : 8 - Type : WEB-ACTIVEX |
2014-01-10 | Microsoft Direct Speech Recognition ActiveX clsid access attempt RuleID : 11830 - Revision : 17 - Type : BROWSER-PLUGINS |
2014-01-10 | Microsoft Voice Control ActiveX function call unicode access RuleID : 11829 - Revision : 8 - Type : WEB-ACTIVEX |
2014-01-10 | Microsoft Voice Control ActiveX function call access RuleID : 11828 - Revision : 11 - Type : BROWSER-PLUGINS |
2014-01-10 | Microsoft Voice Control ActiveX clsid unicode access RuleID : 11827 - Revision : 8 - Type : WEB-ACTIVEX |
2014-01-10 | Microsoft Voice Control Recognition ActiveX clsid access attempt RuleID : 11826 - Revision : 17 - Type : BROWSER-PLUGINS |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2007-06-12 | Name : Arbitrary code can be executed on the remote host through the email client. File : smb_nt_ms07-034.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2015-05-27 21:26:39 |
|
2014-11-16 21:25:19 |
|
2014-06-07 21:22:28 |
|
2014-02-17 11:45:42 |
|
2014-01-19 21:30:05 |
|
2013-11-11 12:41:05 |
|