CVE-2002-0455
CVSS5.0
发布时间 :2002-08-12 00:00:00
修订时间 :2008-09-05 16:28:04
NMCOS    

[原文]IncrediMail stores attachments in a directory with a fixed name, which could make it easier for attackers to exploit vulnerabilities in other software that rely on installing and reading files from directories with known pathnames.


[CNNVD]IncrediMail Ltd. IncrediMail附件路径已知漏洞(CNNVD-200208-148)

        
        Incredimail是一款基于Microsoft windows系统下的邮件客户端程序,包括多种多媒体特征如支持声音,动画和背景。
        在某些版本的Incredimail中存在附件可猜测漏洞,当接收到包含文件附件的邮件时,文件会自动存储在本地系统预先定位的路径上,攻击者可以利用这个信息来进一步对系统进行攻击。
        Incredimail把自动接收到的邮件放在(以Windwos 2000 pro为例)如下目录中:
        C:\Program Files\IncrediMail\Data\Identities\{42D00B20-479C-11d4-9706-00105A40931C}\Message Store\Attachments
        攻击者可以利用IE等自动执行的漏洞来执行包含有恶意代码或者后门的附件。
        

- CVSS (基础分值)

CVSS分值: 5 [中等(MEDIUM)]
机密性影响: NONE [对系统的机密性无影响]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: NONE [对系统可用性无影响]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/a:incredimail:incredimail:build_618
cpe:/a:incredimail:incredimail:build_560
cpe:/a:incredimail:incredimail:build_1400185

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0455
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2002-0455
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200208-148
(官方数据源) CNNVD

- 其它链接及资源

http://www.securityfocus.com/bid/4297
(VENDOR_ADVISORY)  BID  4297
http://www.securityfocus.com/archive/1/262262
(VENDOR_ADVISORY)  BUGTRAQ  20020315 MSIE vulnerability exploitable with IncrediMail
http://www.iss.net/security_center/static/8460.php
(VENDOR_ADVISORY)  XF  incredimail-insecure-attachment-directory(8460)

- 漏洞信息

IncrediMail Ltd. IncrediMail附件路径已知漏洞
中危 设计错误
2002-08-12 00:00:00 2006-09-20 00:00:00
远程  
        
        Incredimail是一款基于Microsoft windows系统下的邮件客户端程序,包括多种多媒体特征如支持声音,动画和背景。
        在某些版本的Incredimail中存在附件可猜测漏洞,当接收到包含文件附件的邮件时,文件会自动存储在本地系统预先定位的路径上,攻击者可以利用这个信息来进一步对系统进行攻击。
        Incredimail把自动接收到的邮件放在(以Windwos 2000 pro为例)如下目录中:
        C:\Program Files\IncrediMail\Data\Identities\{42D00B20-479C-11d4-9706-00105A40931C}\Message Store\Attachments
        攻击者可以利用IE等自动执行的漏洞来执行包含有恶意代码或者后门的附件。
        

- 公告与补丁

        临时解决方法:
        如果您不能立刻安装补丁或者升级,CNNVD建议您采取以下措施以降低威胁:
        * 不要打开不明的邮件附件。
        厂商补丁:
        IncrediMail Ltd.
        ----------------
        目前厂商还没有提供补丁或者升级程序,我们建议使用此软件的用户随时关注厂商的主页以获取最新版本:
        
        http://www.incredimail.com/

- 漏洞信息

14412
IncrediMail Stored Attachment Predictable Filename Weakness

- 漏洞描述

Unknown or Incomplete

- 时间线

2002-03-15 Unknow
Unknow Unknow

- 解决方案

Unknown or Incomplete

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

IncrediMail Ltd. IncrediMail Known Attachment Location Vulnerability
Design Error 4297
Yes No
2002-03-15 12:00:00 2009-07-11 11:56:00
Discovered by Eric DETOISIEN <eric.detoisien@global-secure.fr>.

- 受影响的程序版本

IncrediMail Ltd. IncrediMail Build 618
- Microsoft Windows 2000 Professional SP2
- Microsoft Windows 2000 Professional SP1
- Microsoft Windows 2000 Professional
- Microsoft Windows 95
- Microsoft Windows 98
- Microsoft Windows ME
- Microsoft Windows NT Workstation 4.0 SP6a
- Microsoft Windows NT Workstation 4.0 SP6
- Microsoft Windows NT Workstation 4.0 SP5
- Microsoft Windows NT Workstation 4.0 SP4
- Microsoft Windows NT Workstation 4.0 SP3
- Microsoft Windows NT Workstation 4.0 SP2
- Microsoft Windows NT Workstation 4.0 SP1
- Microsoft Windows NT Workstation 4.0
- Microsoft Windows XP Home
IncrediMail Ltd. IncrediMail Build 560
- Microsoft Windows 2000 Professional SP2
- Microsoft Windows 2000 Professional SP1
- Microsoft Windows 2000 Professional
- Microsoft Windows 95
- Microsoft Windows 98
- Microsoft Windows ME
- Microsoft Windows NT Workstation 4.0 SP6a
- Microsoft Windows NT Workstation 4.0 SP6
- Microsoft Windows NT Workstation 4.0 SP5
- Microsoft Windows NT Workstation 4.0 SP4
- Microsoft Windows NT Workstation 4.0 SP3
- Microsoft Windows NT Workstation 4.0 SP2
- Microsoft Windows NT Workstation 4.0 SP1
- Microsoft Windows NT Workstation 4.0
- Microsoft Windows XP Home
IncrediMail Ltd. IncrediMail Build 1400185
- Microsoft Windows 2000 Professional SP2
- Microsoft Windows 2000 Professional SP1
- Microsoft Windows 2000 Professional
- Microsoft Windows 95
- Microsoft Windows 98
- Microsoft Windows ME
- Microsoft Windows NT Workstation 4.0 SP6a
- Microsoft Windows NT Workstation 4.0 SP6
- Microsoft Windows NT Workstation 4.0 SP5
- Microsoft Windows NT Workstation 4.0 SP4
- Microsoft Windows NT Workstation 4.0 SP3
- Microsoft Windows NT Workstation 4.0 SP2
- Microsoft Windows NT Workstation 4.0 SP1
- Microsoft Windows NT Workstation 4.0
- Microsoft Windows XP Home
IncrediMail Ltd. IncrediMail Build 710
IncrediMail Ltd. IncrediMail Build 690

- 不受影响的程序版本

IncrediMail Ltd. IncrediMail Build 710
IncrediMail Ltd. IncrediMail Build 690

- 漏洞讨论

Incredimail is an email client for Microsoft Windows based systems. It includes support for a wide range of rich, multimedia features such as sound, animations and backgrounds in email.

A weakness has been discovered in some versions of Incredimail. When email is received including a file attachment, the file is automatically stored in a predictable location on the local system. An attacker may be able to use this knowledge to launch further attacks against the vulnerable system.

- 漏洞利用

No exploit is required.

- 解决方案

This issue has been addressed in IncrediMail Build 690 and later.


IncrediMail Ltd. IncrediMail Build 1400185

IncrediMail Ltd. IncrediMail Build 560

IncrediMail Ltd. IncrediMail Build 618

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站