CVE-2004-0215
CVSS5.0
发布时间 :2004-08-06 00:00:00
修订时间 :2008-09-10 15:25:31
NMCOPS    

[原文]Microsoft Outlook Express 5.5 and 6 allows attackers to cause a denial of service (application crash) via a malformed e-mail header.


[CNNVD]Windows Outlook Express畸形邮件头拒绝服务漏洞(MS04-018)(CNNVD-200408-050)

        
        Microsoft Outlook Express是流行的邮件处理程序。
        Microsoft Outlook Express在处理畸形邮件头时存在问题,远程攻击者可以利用这个漏洞对Outlook Express进行拒绝服务攻击。
        目前没有详细漏洞细节提供。
        

- CVSS (基础分值)

CVSS分值: 5 [中等(MEDIUM)]
机密性影响: NONE [对系统的机密性无影响]
完整性影响: NONE [不会对系统完整性产生影响]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/a:avaya:ip600_media_serversAvaya IP600 Media Servers
cpe:/h:avaya:s8100Avaya S8100
cpe:/o:avaya:modular_messaging_message_storage_server:s3400
cpe:/h:avaya:definity_one_media_serverAvaya DefinityOne Media Server
cpe:/a:microsoft:outlook_express:6.0Microsoft outlook_express 6.0

- OVAL (用于检测的技术细节)

oval:org.mitre.oval:def:3376Microsoft Outlook Express v6.0 (WinXP) Malformed Email Header Denial of Service
oval:org.mitre.oval:def:2657Outlook Express v6.0 for Server 2003 Malformed Email Header Denial of Service
oval:org.mitre.oval:def:2137Outlook Express v5.5,SP2 Malformed Email Header Denial of Service
oval:org.mitre.oval:def:1950Microsoft Outlook Express v6,SP1 Malformed Email Header Denial of Service
*OVAL详细的描述了检测该漏洞的方法,你可以从相关的OVAL定义中找到更多检测该漏洞的技术细节。

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0215
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2004-0215
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200408-050
(官方数据源) CNNVD

- 其它链接及资源

http://www.us-cert.gov/cas/techalerts/TA04-196A.html
(VENDOR_ADVISORY)  CERT  TA04-196A
http://www.kb.cert.org/vuls/id/869640
(VENDOR_ADVISORY)  CERT-VN  VU#869640
http://xforce.iss.net/xforce/xfdb/16585
(VENDOR_ADVISORY)  XF  outlook-malformed-email-header-dos(16585)
http://www.microsoft.com/technet/security/bulletin/ms04-018.asp
(UNKNOWN)  MS  MS04-018

- 漏洞信息

Windows Outlook Express畸形邮件头拒绝服务漏洞(MS04-018)
中危 其他
2004-08-06 00:00:00 2005-10-20 00:00:00
远程  
        
        Microsoft Outlook Express是流行的邮件处理程序。
        Microsoft Outlook Express在处理畸形邮件头时存在问题,远程攻击者可以利用这个漏洞对Outlook Express进行拒绝服务攻击。
        目前没有详细漏洞细节提供。
        

- 公告与补丁

        厂商补丁:
        Microsoft
        ---------
        Microsoft已经为此发布了一个安全公告(MS04-018)以及相应补丁:
        MS04-018:Cumulative Security Update for Outlook Express (823353)
        链接:
        http://www.microsoft.com/technet/security/bulletin/MS04-018.mspx

        补丁下载:
        Microsoft Outlook Express 5.5 Service Pack 2
        
        http://www.microsoft.com/downloads/details.aspx?FamilyId=9A8D1BF2-93C5-41A9-B79A-31D54743BA0E&displaylang=en

        Microsoft Outlook Express 6
        
        http://www.microsoft.com/downloads/details.aspx?FamilyId=D5900DF1-10AB-4850-9064-3070CE1F948A&displaylang=en

        
        Microsoft Outlook Express 6 Service Pack 1
        
        http://www.microsoft.com/downloads/details.aspx?FamilyId=AD6A96BC-DAF0-4EAB-89B8-BD702B3E3E5D&displaylang=en

        
        Microsoft Outlook Express 6 Service Pack 1 (64 bit Edition)
        
        http://www.microsoft.com/downloads/details.aspx?FamilyId=ADCCF304-6CFC-48D6-9A3F-2A601C3A04A5&displaylang=en

        
        Microsoft Outlook Express 6 on Windows Server 2003
        
        http://www.microsoft.com/downloads/details.aspx?FamilyId=C99AAFCD-B99B-4B13-A366-5F8EDC83633F&displaylang=en

        
        Microsoft Outlook Express 6 on Windows Server 2003 (64 bit edition)
        
        http://www.microsoft.com/downloads/details.aspx?FamilyId=10D1AAD0-0313-4BEB-A174-84CF573F31FD&displaylang=en

- 漏洞信息 (F33782)

Technical Cyber Security Alert 2004-196A (PacketStormID:F33782)
2004-07-14 00:00:00
US-CERT  us-cert.gov
advisory,remote,overflow,shell,vulnerability,code execution
windows,osx
CVE-2003-1041,CVE-2004-0201,CVE-2004-0205,CVE-2004-0210,CVE-2004-0212,CVE-2004-0213,CVE-2004-0215,CVE-2004-0420
[点击下载]

Technical Cyber Security Alert TA04-196A - Multitudes of vulnerabilities have been discovered amongst the Microsoft product line. Flaws that exist include Outlook Express failing to properly validate malformed e-mail headers, the Utility Manager allowing code execution, POSIX allowing code execution, IIS having a buffer overflow, the Task Scheduler having a buffer overflow, the HTML Help component failing to properly validate input data, and the Windows Shell allowing remote code execution.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

                        National Cyber Alert System
                   Technical Cyber Security Alert TA04-196A

Multiple Vulnerabilities in Microsoft Windows Components and Outlook Express

   Original release date: July 14, 2004
   Last revised: --
   Source: US-CERT

Systems Affected

     * Microsoft Windows Systems

Overview

   Microsoft has released a Security Bulletin Summary for July, 2004.
   This summary includes several bulletins that address vulnerabilities
   in various Windows applications and components. Exploitation of some
   vulnerabilities can result in the remote execution of arbitrary code
   by a remote attacker. Details of the vulnerabilities and their impacts
   are provided below.

I. Description

   The table below provides a reference between Microsoft's Security
   Bulletins and the related US-CERT Vulnerability Notes. More
   information related to the vulnerabilities is available in these
   documents.

   _________________________________________________________________

   Format:
 
   Microsoft Security Bulletin 

   Related US-CERT Vulnerability Note(s)
   _________________________________________________________________

   MS04-024: Vulnerability in Windows Shell Could Allow Remote Code
   Execution (839645) 

   VU#106324 Microsoft Windows contains a
   vulnerability in the way the Windows Shell launches applications
   _________________________________________________________________
   
   MS04-023: Vulnerability in HTML Help Could Allow Code Execution
   (840315) 

   VU#187196 Microsoft Windows fails to properly process
   showHelp URLs

   VU#920060 Microsoft Windows HTML Help component fails to properly
   validate input data
   _________________________________________________________________

   MS04-022: Vulnerability in Task Scheduler Could Allow Code Execution
   (841873) 

   VU#228028 Microsoft Windows Task Scheduler Buffer Overflow
   _________________________________________________________________

   MS04-021: Security Update for IIS 4.0 (841373) 

   VU#717748 Microsoft Internet Information Server (IIS) 4.0 contains a 
   buffer overflow in the redirect function
   _________________________________________________________________
    
   MS04-020: Vulnerability in POSIX Could Allow Code Execution (841872)
   
   VU#647436 Microsoft Windows contains a buffer overflow in the POSIX
   subsystem
   _________________________________________________________________
   
   MS04-019: Vulnerability in Utility Manager Could Allow Code Execution
   (842526) 

   VU#868580 Microsoft Windows Utility Manager launches applications with 
   system privileges
   _________________________________________________________________
  
   MS04-018: Cumulative Security Update for Outlook Express (823353)

   VU#869640 Microsoft Outlook Express fails to properly validate
   malformed e-mail headers
   _________________________________________________________________

II. Impact

   A remote, unauthenticated attacker may exploit VU#717748 to execute
   arbitrary code on an IIS 4.0 system.

   Exploitation of VU#106324, VU#187196, VU#920060, and VU#228028, would
   permit a remote attacker to execute arbitrary code with the privileges
   of the current user. The attacker would have to convince a victim to
   view an HTML document (web page, HTML email) or click on a crafted URI
   link.

   Vulnerabilities described in VU#647436 and VU#868580 permit a local
   user to gain elevated privileges on the local system.

   Exploitation of VU#869640 can lead to a denial-of-service condition
   against Outlook Express.

III. Solution

Apply a patch

   Microsoft has provided the patches for these vulnerabilities in the
   Security Bulletins and on Windows Update.

Do not follow unsolicited links

   It is generally a good practice not to click on unsolicited URLs
   received in email, instant messages, web forums, or Internet relay
   chat (IRC) channels. However, this practice does not always prevent
   exploitation of these types vulnerabilities. For example, a trusted
   web site could be compromised and modified to deliver exploit script
   to unsuspecting clients.

Maintain updated anti-virus software

   Anti-virus software with updated virus definitions may identify and
   prevent some exploit attempts, but variations of exploits or attack
   vectors may not be detected. Do not rely solely on anti-virus software
   to defend against these vulnerabilities. More information about
   viruses and anti-virus vendors is available on the US-CERT Computer
   Virus Resources page.

Appendix A. Vendor Information

   Specific information about these issue are available in the Security
   Bulletin Summary for July, 2004 and the US-CERT Vulnerability Notes.

Appendix B. References

     * Microsoft's Security Bulletin Summary for July, 2004 -
       <http://www.microsoft.com/technet/security/bulletin/ms04-jul.mspx>

     * US-CERT Vulnerability Note VU#106324 -
       <http://www.kb.cert.org/vuls/id/106324>

     * US-CERT Vulnerability Note VU#187196 -
       <http://www.kb.cert.org/vuls/id/187196>

     * US-CERT Vulnerability Note VU#920060 -
       <http://www.kb.cert.org/vuls/id/920060>

     * US-CERT Vulnerability Note VU#228028 -
       <http://www.kb.cert.org/vuls/id/228028>

     * US-CERT Vulnerability Note VU#717748 -
       <http://www.kb.cert.org/vuls/id/717748>

     * US-CERT Vulnerability Note VU#647436 -
       <http://www.kb.cert.org/vuls/id/647436>

     * US-CERT Vulnerability Note VU#868580 -
       <http://www.kb.cert.org/vuls/id/868580>

     * US-CERT Vulnerability Note VU#869640 -
       <http://www.kb.cert.org/vuls/id/869640>

     * Increase Your Browsing and E-Mail Safety -
       <http://www.microsoft.com/security/incident/settings.mspx>

     * Working with Internet Explorer 6 Security Settings -
       <http://www.microsoft.com/windows/ie/using/howto/security/settings
       .mspx>
   _________________________________________________________________

   This alert was created by Jason A. Rafail. Feedback can be directed to
   the Vulnerability Note authors: Jason A. Rafail, Jeff P. Lanza, Chad
   R. Dougherty, Damon G. Morda, and Art Manion.
   _________________________________________________________________

   This document is available from: 
   
      <http://www.us-cert.gov/cas/techalerts/TA04-196A.html>      
   
   _________________________________________________________________
   
   Copyright 2004 Carnegie Mellon University.
   
   Terms of use: <http://www.us-cert.gov/legal.html>
   _________________________________________________________________

   Revision History

   July 14, 2004: Initial release

                        Last updated July 14, 2004 
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (GNU/Linux)

iD8DBQFA9ZD4XlvNRxAkFWARApJoAJ9kLfHwh9rjM39LkWpRYYkPDngD+QCcDj6Q
P8VLUzmOQoMFj+903rIsKHU=
=4I7x
-----END PGP SIGNATURE-----
    

- 漏洞信息

7793
Microsoft Outlook Express Header Validation DoS
Denial of Service
Loss of Availability

- 漏洞描述

Unknown or Incomplete

- 时间线

2004-07-13 Unknow
Unknow Unknow

- 解决方案

Unknown or Incomplete

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

Microsoft Outlook Express Malformed Email Header Denial Of Service Vulnerability
Failure to Handle Exceptional Conditions 10711
Yes No
2004-07-13 12:00:00 2009-07-12 06:16:00
This issue was announced by the vendor.

- 受影响的程序版本

Microsoft Outlook Express 6.0
+ Microsoft Windows Server 2003 Datacenter Edition
+ Microsoft Windows Server 2003 Datacenter Edition
+ Microsoft Windows Server 2003 Datacenter Edition
+ Microsoft Windows Server 2003 Datacenter Edition Itanium 0
+ Microsoft Windows Server 2003 Datacenter Edition Itanium 0
+ Microsoft Windows Server 2003 Datacenter Edition Itanium 0
+ Microsoft Windows Server 2003 Enterprise Edition
+ Microsoft Windows Server 2003 Enterprise Edition
+ Microsoft Windows Server 2003 Enterprise Edition
+ Microsoft Windows Server 2003 Enterprise Edition Itanium 0
+ Microsoft Windows Server 2003 Enterprise Edition Itanium 0
+ Microsoft Windows Server 2003 Enterprise Edition Itanium 0
+ Microsoft Windows Server 2003 Itanium SP2
+ Microsoft Windows Server 2003 Itanium SP2
+ Microsoft Windows Server 2003 Itanium SP1
+ Microsoft Windows Server 2003 Itanium SP1
+ Microsoft Windows Server 2003 Standard Edition
+ Microsoft Windows Server 2003 Standard Edition
+ Microsoft Windows Server 2003 Standard Edition
+ Microsoft Windows Server 2003 Standard x64 Edition
+ Microsoft Windows Server 2003 Standard x64 Edition
+ Microsoft Windows Server 2003 Web Edition
+ Microsoft Windows Server 2003 Web Edition
+ Microsoft Windows Server 2003 Web Edition
+ Microsoft Windows Server 2003 x64 SP2
+ Microsoft Windows Server 2003 x64 SP2
+ Microsoft Windows XP 64-bit Edition
+ Microsoft Windows XP 64-bit Edition
+ Microsoft Windows XP Home
+ Microsoft Windows XP Home
+ Microsoft Windows XP Home
+ Microsoft Windows XP Media Center Edition SP2
+ Microsoft Windows XP Media Center Edition SP2
+ Microsoft Windows XP Media Center Edition
+ Microsoft Windows XP Media Center Edition
+ Microsoft Windows XP Media Center Edition
+ Microsoft Windows XP Professional
+ Microsoft Windows XP Professional
+ Microsoft Windows XP Professional
+ Microsoft Windows XP Professional x64 Edition SP2
+ Microsoft Windows XP Professional x64 Edition SP2
+ Microsoft Windows XP Tablet PC Edition SP2
+ Microsoft Windows XP Tablet PC Edition SP2
+ Microsoft Windows XP Tablet PC Edition
+ Microsoft Windows XP Tablet PC Edition
Avaya S8100 Media Servers 0
+ Microsoft Windows 2000 Server
+ Microsoft Windows NT Server 4.0 SP6a
Avaya S3400 Message Application Server 0
+ Microsoft Windows 2000 Server
Avaya IP600 Media Servers
Avaya DefinityOne Media Servers

- 漏洞讨论

Microsoft Outlook Express is prone to a security vulnerability when processing emails with malformed header data. A remote attacker may potentially exploit this issue to cause a persistent denial of service in the email client.

This issue is only reported to affect Outlook Express 6.0 on Windows XP platforms.

- 漏洞利用

There is no exploit required.

- 解决方案

Microsoft has released a security bulletin that includes fixes to address this issue. This security bulletin also provides cumulative patches for non-affected versions that contain various security enhancements. Users are advised to install the applicable cumulative patches even if they are running a version of Outlook Express that is not affected by the vulnerability. Please see the attached bulletin for further information.

Avaya has released an advisory that acknowledges this vulnerability for Avaya products. Avaya advise that customers follow the Microsoft recommendations to address this issue. Please see the referenced Avaya advisory at the following location for further details:
http://support.avaya.com/japple/css/japple?temp.groupID=128450&temp.selectedFamily=128451&temp.selectedProduct=154235&temp.selectedBucket=126655&temp.feedbackState=askForFeedback&temp.documentID=197331&PAGE=avaya.css.CSSLvl1Detail&executeTransaction=avaya.css.UsageUpdate()


Microsoft Outlook Express 6.0

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站