[原文]Argument injection vulnerability in Microsoft Outlook 2003 SP1 allows user-assisted remote attackers to modify command line arguments to an invoked mail client via " (double quote) characters in a mailto: scheme handler, as demonstrated by launching Microsoft Outlook with an arbitrary filename as an attachment. NOTE: it is not clear whether this issue is implementation-specific or a problem in the Microsoft API.
Microsoft Office contains a flaw that may allow a remote attacker to access arbitrary files. The issue is due to Microsoft Outlook not properly sanitizing the value of the 'mailto' URI handler. This may allow an attacker to automatically attach an arbitrary file to an e-mail by tricking a user into following a specially crafted link with the "mailto:" URI handler from a malicious web site.
Currently, there are no known upgrades, patches, or workarounds available to correct this issue.