| VID |
26076 |
| Severity |
40 |
| Port |
139,445 |
| Protocol |
TCP |
| Class |
SMB |
| Detailed Description |
The Microsoft Outlook, according to its version number, has a "mailto:" Parameter Passing Vulnerability (MS04-009). Microsoft Outlook provides an integrated solution for managing and organizing e-mail messages, schedules, tasks, notes, contacts, and other information. A security vulnerability exists within Outlook 2002 that could allow Internet Explorer to execute script code in the Local Machine zone on an affected system. The parsing of specially crafted mailto URLs by Outlook 2002 causes this vulnerability. To exploit this vulnerability, an attacker could create a malicious Web page and host it on a Web site or send it to a victim as an HTML E-Mail, and then persuade the user to click the malicious link.
* Note: This check requires an account with administrative privileges which can log into the host to scan. Absence of these condition will result in the check not being performed and a False Negative for all vulnerable hosts.
* References: http://www.microsoft.com/technet/security/bulletin/ms04-009.mspx http://www.kb.cert.org/vuls/id/305206 http://www.ciac.org/ciac/bulletins/o-096.shtml http://www.idefense.com/application/poi/display?id=79&type=vulnerabilities&flashstatus=true http://www.securiteam.com/windowsntfocus/5IP0C00CAY.html http://archives.neohapsis.com/archives/bugtraq/2004-03/0086.html
* Platforms Affected: Microsoft Office XP Service Pack 2 Microsoft Outlook 2002 Service Pack 2 Microsoft Windows Any version |
| Recommendation |
Apply the appropriate patch for your system, as listed in the Microsoft Security Bulletin MS04-009 at http://www.microsoft.com/technet/security/bulletin/ms04-009.mspx |
| Related URL |
CVE-2004-0121 (CVE) |
| Related URL |
9827 (SecurityFocus) |
| Related URL |
15414 (ISS) |
|