CVE-2001-0999
CVSS7.5
发布时间 :2001-09-12 00:00:00
修订时间 :2008-09-05 16:25:26
NMCOS    

[原文]Outlook Express 6.00 allows remote attackers to execute arbitrary script by embedding SCRIPT tags in a message whose MIME content type is text/plain, contrary to the expected behavior that text/plain messages will not run script.


[CNNVD]Microsoft Outlook Express 6纯文本邮件脚本执行漏洞(CNNVD-200109-047)

        Outlook Express 6.00版本存在漏洞。远程攻击者可以通过向MIME目录类型是text/plain的信息中植入SCRIPT标签执行任意脚本,该漏洞相反于text/plain信息不运行脚本的预期行为。

- CVSS (基础分值)

CVSS分值: 7.5 [严重(HIGH)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

产品及版本信息(CPE)暂不可用

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0999
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2001-0999
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200109-047
(官方数据源) CNNVD

- 其它链接及资源

http://xforce.iss.net/static/7118.php
(VENDOR_ADVISORY)  XF  outlook-express-text-script-execution(7118)
http://www.securityfocus.com/bid/3334
(VENDOR_ADVISORY)  BID  3334
http://www.securityfocus.com/archive/1/214453
(VENDOR_ADVISORY)  BUGTRAQ  20010915 Proof-Of-Concept Perl Script for Bugtraq-ID: #3334
http://www.securityfocus.com/archive/1/213754
(VENDOR_ADVISORY)  BUGTRAQ  20010912 FREAK SHOW: Outlook Express 6.00

- 漏洞信息

Microsoft Outlook Express 6纯文本邮件脚本执行漏洞
高危 未知
2001-09-12 00:00:00 2005-10-20 00:00:00
远程  
        Outlook Express 6.00版本存在漏洞。远程攻击者可以通过向MIME目录类型是text/plain的信息中植入SCRIPT标签执行任意脚本,该漏洞相反于text/plain信息不运行脚本的预期行为。

- 公告与补丁

        Currently the SecurityFocus staff are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com .

- 漏洞信息

11418
Microsoft Outlook Express text/plain MIME Content Embedded SCRIPT Tag Command Execution
Local / Remote Input Manipulation
Loss of Integrity Solution Unknown

- 漏洞描述

Unknown or Incomplete

- 时间线

2001-09-12 Unknow
Unknow Unknow

- 解决方案

Unknown or Incomplete

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

Microsoft Outlook Express 6 Plain Text Message Script Execution Vulnerability
Unknown 3334
Yes No
2001-09-12 12:00:00 2009-07-11 07:56:00
This vulnerability was posted to BugTraq by http-equiv@excite.com <http-equiv@excite.com>.

- 受影响的程序版本

Microsoft Outlook Express 6.0
+ Microsoft Windows Server 2003 Datacenter Edition
+ Microsoft Windows Server 2003 Datacenter Edition
+ Microsoft Windows Server 2003 Datacenter Edition
+ Microsoft Windows Server 2003 Datacenter Edition Itanium 0
+ Microsoft Windows Server 2003 Datacenter Edition Itanium 0
+ Microsoft Windows Server 2003 Datacenter Edition Itanium 0
+ Microsoft Windows Server 2003 Enterprise Edition
+ Microsoft Windows Server 2003 Enterprise Edition
+ Microsoft Windows Server 2003 Enterprise Edition
+ Microsoft Windows Server 2003 Enterprise Edition Itanium 0
+ Microsoft Windows Server 2003 Enterprise Edition Itanium 0
+ Microsoft Windows Server 2003 Enterprise Edition Itanium 0
+ Microsoft Windows Server 2003 Itanium SP2
+ Microsoft Windows Server 2003 Itanium SP2
+ Microsoft Windows Server 2003 Itanium SP1
+ Microsoft Windows Server 2003 Itanium SP1
+ Microsoft Windows Server 2003 Standard Edition
+ Microsoft Windows Server 2003 Standard Edition
+ Microsoft Windows Server 2003 Standard Edition
+ Microsoft Windows Server 2003 Standard x64 Edition
+ Microsoft Windows Server 2003 Standard x64 Edition
+ Microsoft Windows Server 2003 Web Edition
+ Microsoft Windows Server 2003 Web Edition
+ Microsoft Windows Server 2003 Web Edition
+ Microsoft Windows Server 2003 x64 SP2
+ Microsoft Windows Server 2003 x64 SP2
+ Microsoft Windows XP 64-bit Edition
+ Microsoft Windows XP 64-bit Edition
+ Microsoft Windows XP Home
+ Microsoft Windows XP Home
+ Microsoft Windows XP Home
+ Microsoft Windows XP Media Center Edition SP2
+ Microsoft Windows XP Media Center Edition SP2
+ Microsoft Windows XP Media Center Edition
+ Microsoft Windows XP Media Center Edition
+ Microsoft Windows XP Media Center Edition
+ Microsoft Windows XP Professional
+ Microsoft Windows XP Professional
+ Microsoft Windows XP Professional
+ Microsoft Windows XP Professional x64 Edition SP2
+ Microsoft Windows XP Professional x64 Edition SP2
+ Microsoft Windows XP Tablet PC Edition SP2
+ Microsoft Windows XP Tablet PC Edition SP2
+ Microsoft Windows XP Tablet PC Edition
+ Microsoft Windows XP Tablet PC Edition

- 漏洞讨论

Microsoft Outlook Express 6 contains a vulnerability which allows an email message of content-type 'text/plain' to execute specifically crafted scripting components.

It is important to note that Outlook Express 6 does not allow any scripting to be executed by default. This security feature must be turned off in order to exploit this vulnerability.

- 漏洞利用

There is no exploit required.

- 解决方案

Currently the SecurityFocus staff are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com <mailto:vuldb@securityfocus.com>.

- 相关参考

     

     

    关于SCAP中文社区

    SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

    版权声明

    CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站