Executive Summary
Summary | |
---|---|
Title | Vulnerability in Outlook Express and Windows Mail Could Allow Remote Code Execution (978542) |
Informations | |||
---|---|---|---|
Name | MS10-030 | First vendor Publication | 2010-05-11 |
Vendor | Microsoft | Last vendor Modification | 2010-05-19 |
Severity (Vendor) | Critical | Revision | 1.2 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:M/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 9.3 | Attack Range | Network |
Cvss Impact Score | 10 | Attack Complexity | Medium |
Cvss Expoit Score | 8.6 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Revision Note: V1.2 (May 19, 2010): Removed erroneous references to Windows Mail when installed on Windows 7 and Windows Server 2008 R2. Also corrected the bulletin replacement information for Windows XP, Windows Server 2003, and Windows Vista update packages.Summary: This security update resolves a privately reported vulnerability in Outlook Express, Windows Mail, and Windows Live Mail. The vulnerability could allow remote code execution if a user visits a malicious e-mail server. An attacker who successfully exploited this vulnerability could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. |
Original Source
Url : http://www.microsoft.com/technet/security/bulletin/MS10-030.mspx |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-189 | Numeric Errors (CWE/SANS Top 25) |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:6734 | |||
Oval ID: | oval:org.mitre.oval:def:6734 | ||
Title: | Outlook Express and Windows Mail Integer Overflow Vulnerability | ||
Description: | Integer overflow in inetcomm.dll in Microsoft Outlook Express 5.5 SP2, 6, and 6 SP1; Windows Live Mail on Windows XP SP2 and SP3, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7; and Windows Mail on Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7 allows remote e-mail servers and man-in-the-middle attackers to execute arbitrary code via a crafted (1) POP3 or (2) IMAP response, as demonstrated by a certain +OK response on TCP port 110, aka "Outlook Express and Windows Mail Integer Overflow Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2010-0816 | Version: | 10 |
Platform(s): | Microsoft Windows 2000 Microsoft Windows XP Microsoft Windows Server 2003 Microsoft Windows Vista Microsoft Windows 7 Microsoft Windows Server 2008 Microsoft Windows Server 2008 R2 | Product(s): | Microsoft Outlook Express Microsoft Windows Mail Microsoft Windows Live Mail |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Application | 3 | |
Application | 1 | |
Application | 1 |
ExploitDB Exploits
id | Description |
---|---|
2010-05-11 | Microsoft Windows Outlook Express and Windows Mail Integer Overflow |
OpenVAS Exploits
Date | Description |
---|---|
2010-05-13 | Name : Microsoft Outlook Express and Windows Mail Remote Code Execution Vulnerabilit... File : nvt/secpod_ms10-030.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
64530 | Microsoft Outlook Express / Windows Mail STAT Response Overflow Outlook Express and Windows Live Mail are prone to an overflow condition. The application fails to properly sanitize server-supplied input resulting in an integer overflow. With a specially crafted STAT response, a remote attacker can potentially cause arbitrary code execution. |
Information Assurance Vulnerability Management (IAVM)
Date | Description |
---|---|
2010-05-13 | IAVM : 2010-B-0039 - Microsoft Outlook Express and Windows Mail Remote Code Executio Vulnerability Severity : Category II - VMSKEY : V0024168 |
Snort® IPS/IDS
Date | Description |
---|---|
2014-01-10 | Microsoft Windows Mail remote code execution attempt RuleID : 16595 - Revision : 16 - Type : SERVER-MAIL |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2010-05-11 | Name : An integer overflow vulnerability is present on the remote host due to an iss... File : smb_nt_ms10-030.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-02-17 11:46:33 |
|
2014-01-19 21:30:28 |
|
2013-11-11 12:41:17 |
|