Thread-topic: [SA25639] Microsoft Outlook Express and Windows Mail Multiple Vulnerabilities
>
> TITLE:
> Microsoft Outlook Express and Windows Mail Multiple Vulnerabilities
>
> SECUNIA ADVISORY ID:
> SA25639
>
> VERIFY ADVISORY:
>
>
> CRITICAL:
> Highly critical
>
> IMPACT:
> Security Bypass, Exposure of sensitive information, System access
>
> WHERE:
> From remote
>
> OPERATING SYSTEM:
> Microsoft Windows XP Professional
>
> Microsoft Windows XP Home Edition
>
> Microsoft Windows Vista
>
> Microsoft Windows Storage Server 2003
>
> Microsoft Windows Server 2003 Web Edition
>
> Microsoft Windows Server 2003 Standard Edition
>
> Microsoft Windows Server 2003 Enterprise Edition
>
> Microsoft Windows Server 2003 Datacenter Edition
>
>
> SOFTWARE:
> Microsoft Outlook Express 6
>
>
> DESCRIPTION:
> Some vulnerabilities have been reported in Microsoft Outlook Express
> and Windows Mail, which can be exploited by malicious people to
> disclose sensitive information and compromise a user's system.
>
> 1) An error in Windows Mail within the handling of UNC navigation
> requests can be exploited to execute arbitrary code via a local file
> or UNC path when a user clicks on a link in a specially crafted email
> message.
>
> 2) An error in the MHTML protocol handler when returning MHTML
> content can be exploited to read data from another security zone or
> domain in Internet Explorer when a user visits a specially crafted
> web page.
>
> 3) An error exists in the MHTML protocol handler when passing
> Content-Disposition notifications back to Internet Explorer. This can
> be exploited to bypass the file download dialog box and to read data
> from another Internet Explorer domain when a user visits a specially
> crafted web page.
>
> SOLUTION:
> Apply patches.
>
> Windows XP SP2:
>
556-0872-4803-b610-4c895ceb99aa
>
> Windows XP Professional x64 Edition (optionally with SP2):
>
3bf-bddb-40f0-8960-b9debc8413e7
>
> Windows Server 2003 SP1/SP2:
>
a74-035c-4ab7-9283-c693d7bd82be
>
> Windows Server 2003 x64 Edition (optionally with SP2):
>
3a9-e285-45e5-84bd-71ae9da126e3
>
> Windows Server 2003 SP1/SP2 for Itanium-based systems:
>
96e-6571-437d-a612-99175ac39025
>
> Windows Vista:
>
e19-44ea-48f2-ae28-e76fd2018633
>
> Windows Vista x64 Edition:
>
20f-7794-4423-b11d-885329fbdf78
>
> PROVIDED AND/OR DISCOVERED BY:
> 1) kingcope
> 2) Reported by the vendor.
> 3) The vendor credits Yosuke Hasegawa, WebAppSec.JP.
>
> ORIGINAL ADVISORY:
> MS07-034 (KB929123):
>
>