Korean
<< Back
VID 26076
Severity 40
Port 139,445
Protocol TCP
Class SMB
Detailed Description The Microsoft Outlook, according to its version number, has a "mailto:" Parameter Passing Vulnerability (MS04-009).
Microsoft Outlook provides an integrated solution for managing and organizing e-mail messages, schedules, tasks, notes, contacts, and other information. A security vulnerability exists within Outlook 2002 that could allow Internet Explorer to execute script code in the Local Machine zone on an affected system. The parsing of specially crafted mailto URLs by Outlook 2002 causes this vulnerability. To exploit this vulnerability, an attacker could create a malicious Web page and host it on a Web site or send it to a victim as an HTML E-Mail, and then persuade the user to click the malicious link.

* Note: This check requires an account with administrative privileges which can log into the host to scan. Absence of these condition will result in the check not being performed and a False Negative for all vulnerable hosts.

* References:
http://www.microsoft.com/technet/security/bulletin/ms04-009.mspx
http://www.kb.cert.org/vuls/id/305206
http://www.ciac.org/ciac/bulletins/o-096.shtml
http://www.idefense.com/application/poi/display?id=79&type=vulnerabilities&flashstatus=true
http://www.securiteam.com/windowsntfocus/5IP0C00CAY.html
http://archives.neohapsis.com/archives/bugtraq/2004-03/0086.html

* Platforms Affected:
Microsoft Office XP Service Pack 2
Microsoft Outlook 2002 Service Pack 2
Microsoft Windows Any version
Recommendation Apply the appropriate patch for your system, as listed in the Microsoft Security Bulletin MS04-009 at http://www.microsoft.com/technet/security/bulletin/ms04-009.mspx
Related URL CVE-2004-0121 (CVE)
Related URL 9827 (SecurityFocus)
Related URL 15414 (ISS)