Executive Summary

Informations
Name MS04-013 First vendor Publication N/A
Vendor Microsoft Last vendor Modification N/A
Severity (Vendor) N/A Revision N/A

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:C/I:C/A:C)
Cvss Base Score 10 Attack Range Network
Cvss Impact Score 10 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Cumulative Security Update for Outlook Express (837009)

CAPEC : Common Attack Pattern Enumeration & Classification

Id Name
CAPEC-58 Restful Privilege Elevation

CWE : Common Weakness Enumeration

% Id Name

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:1010
 
Oval ID: oval:org.mitre.oval:def:1010
Title: Microsoft Outlook Express v6.0,SP1 MHTML URL Processing Vulnerability
Description: The MHTML protocol handler in Microsoft Outlook Express 5.5 SP2 through Outlook Express 6 SP1 allows remote attackers to bypass domain restrictions and execute arbitrary code, as demonstrated on Internet Explorer using script in a compiled help (CHM) file that references the InfoTech Storage (ITS) protocol handlers such as (1) ms-its, (2) ms-itss, (3) its, or (4) mk:@MSITStore, aka the "MHTML URL Processing Vulnerability."
Family: windows Class: vulnerability
Reference(s): CVE-2004-0380
Version: 1
Platform(s): Microsoft Windows 98
Microsoft Windows ME
Microsoft Windows NT
Microsoft Windows 2000
Microsoft Windows XP
Product(s): Microsoft Outlook Express
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:1028
 
Oval ID: oval:org.mitre.oval:def:1028
Title: Microsoft Outlook Express v6.0 for Server 2003 MHTML URL Processing Vulnerability
Description: The MHTML protocol handler in Microsoft Outlook Express 5.5 SP2 through Outlook Express 6 SP1 allows remote attackers to bypass domain restrictions and execute arbitrary code, as demonstrated on Internet Explorer using script in a compiled help (CHM) file that references the InfoTech Storage (ITS) protocol handlers such as (1) ms-its, (2) ms-itss, (3) its, or (4) mk:@MSITStore, aka the "MHTML URL Processing Vulnerability."
Family: windows Class: vulnerability
Reference(s): CVE-2004-0380
Version: 2
Platform(s): Microsoft Windows Server 2003
Product(s): Microsoft Outlook Express
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:882
 
Oval ID: oval:org.mitre.oval:def:882
Title: Microsoft Outlook Express v5.5,SP2 MHTML URL Processing Vulnerability
Description: The MHTML protocol handler in Microsoft Outlook Express 5.5 SP2 through Outlook Express 6 SP1 allows remote attackers to bypass domain restrictions and execute arbitrary code, as demonstrated on Internet Explorer using script in a compiled help (CHM) file that references the InfoTech Storage (ITS) protocol handlers such as (1) ms-its, (2) ms-itss, (3) its, or (4) mk:@MSITStore, aka the "MHTML URL Processing Vulnerability."
Family: windows Class: vulnerability
Reference(s): CVE-2004-0380
Version: 1
Platform(s): Microsoft Windows 98
Microsoft Windows ME
Microsoft Windows NT
Microsoft Windows 2000
Product(s): Microsoft Outlook Express
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:990
 
Oval ID: oval:org.mitre.oval:def:990
Title: Microsoft Outlook Express v6.0 MHTML URL Processing Vulnerability
Description: The MHTML protocol handler in Microsoft Outlook Express 5.5 SP2 through Outlook Express 6 SP1 allows remote attackers to bypass domain restrictions and execute arbitrary code, as demonstrated on Internet Explorer using script in a compiled help (CHM) file that references the InfoTech Storage (ITS) protocol handlers such as (1) ms-its, (2) ms-itss, (3) its, or (4) mk:@MSITStore, aka the "MHTML URL Processing Vulnerability."
Family: windows Class: vulnerability
Reference(s): CVE-2004-0380
Version: 4
Platform(s): Microsoft Windows XP
Product(s): Microsoft Outlook Express
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 2

ExploitDB Exploits

id Description
2004-02-13 Microsoft Internet Explorer 5.0.1 ITS Protocol Zone Bypass Vulnerability

Open Source Vulnerability Database (OSVDB)

Id Description
5242 Microsoft IE/Outlook MHTML .chm ITS Protocol Handler Code Execution

Outlook Express contains a flaw in the handling of MHTML URLs that may allow a malicious user to execute remote code in the Local Machine security zone. The issue is triggered when OE receives a malformed CLSID parameter while parsing an MHTML URL. The ability to run remote code in the Local Machine security zone may allow a malicious user to gain control of the system, resulting in a loss of confidentiality, integrity, and/or availability.
3307 Microsoft IE showHelp() Zone Restriction Bypass

Snort® IPS/IDS

Date Description
2017-12-07 Microsoft Outlook Express mhtml code execution attempt
RuleID : 44735 - Revision : 2 - Type : SERVER-MAIL
2017-12-07 Microsoft Outlook Express mhtml code execution attempt
RuleID : 44734 - Revision : 2 - Type : SERVER-MAIL

Nessus® Vulnerability Scanner

Date Description
2004-04-13 Name : Arbitrary code can be executed on the remote host through the web client.
File : smb_nt_ms04-013.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
Date Informations
2014-02-17 11:44:59
  • Multiple Updates