Vulnerabilities > CVE-2004-0380 - Unspecified vulnerability in Microsoft Outlook Express 5.5/6.0

047910
CVSS 0.0 - NONE
Attack vector
UNKNOWN
Attack complexity
UNKNOWN
Privileges required
UNKNOWN
Confidentiality impact
UNKNOWN
Integrity impact
UNKNOWN
Availability impact
UNKNOWN
microsoft
nessus
exploit available

Summary

The MHTML protocol handler in Microsoft Outlook Express 5.5 SP2 through Outlook Express 6 SP1 allows remote attackers to bypass domain restrictions and execute arbitrary code, as demonstrated on Internet Explorer using script in a compiled help (CHM) file that references the InfoTech Storage (ITS) protocol handlers such as (1) ms-its, (2) ms-itss, (3) its, or (4) mk:@MSITStore, aka the "MHTML URL Processing Vulnerability."

Vulnerable Configurations

Part Description Count
Application
Microsoft
2

Exploit-Db

  • descriptionMicrosoft Internet Explorer 5.0.1 ITS Protocol Zone Bypass Vulnerability. CVE-2004-0380. Remote exploit for windows platform
    idEDB-ID:23695
    last seen2016-02-02
    modified2004-02-13
    published2004-02-13
    reporteranonymous
    sourcehttps://www.exploit-db.com/download/23695/
    titleMicrosoft Internet Explorer 5.0.1 ITS Protocol Zone Bypass Vulnerability
  • descriptionMicrosoft Outlook Express 6.0 MHTML Forced File Execution Vulnerability (2). CVE-2004-0380. Remote exploit for windows platform
    idEDB-ID:23401
    last seen2016-02-02
    modified2003-11-25
    published2003-11-25
    reporterLiu Die Yu
    sourcehttps://www.exploit-db.com/download/23401/
    titleMicrosoft Outlook Express 6.0 MHTML Forced File Execution Vulnerability 2
  • descriptionMicrosoft Outlook Express 6.0 MHTML Forced File Execution Vulnerability (1). CVE-2004-0380. Remote exploit for windows platform
    idEDB-ID:23400
    last seen2016-02-02
    modified2003-11-25
    published2003-11-25
    reporterLiu Die
    sourcehttps://www.exploit-db.com/download/23400/
    titleMicrosoft Outlook Express 6.0 MHTML Forced File Execution Vulnerability 1

Nessus

NASL familyWindows : Microsoft Bulletins
NASL idSMB_NT_MS04-013.NASL
descriptionThe remote host has a version of Outlook Express that has a bug in its MHTML URL processor that could allow an attacker to execute arbitrary code on this host. To exploit this flaw, an attacker would need to send a malformed email to a user of this host using Outlook, or would need to lure him into visiting a rogue website.
last seen2020-06-01
modified2020-06-02
plugin id12208
published2004-04-13
reporterThis script is Copyright (C) 2004-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/12208
titleMS04-013: Cumulative Update for Outlook Express (837009)

Oval

  • accepted2004-05-25T12:00:00.000-04:00
    classvulnerability
    contributors
    nameAndrew Buttner
    organizationThe MITRE Corporation
    descriptionThe MHTML protocol handler in Microsoft Outlook Express 5.5 SP2 through Outlook Express 6 SP1 allows remote attackers to bypass domain restrictions and execute arbitrary code, as demonstrated on Internet Explorer using script in a compiled help (CHM) file that references the InfoTech Storage (ITS) protocol handlers such as (1) ms-its, (2) ms-itss, (3) its, or (4) mk:@MSITStore, aka the "MHTML URL Processing Vulnerability."
    familywindows
    idoval:org.mitre.oval:def:1010
    statusaccepted
    submitted2004-04-13T12:00:00.000-04:00
    titleMicrosoft Outlook Express v6.0,SP1 MHTML URL Processing Vulnerability
    version64
  • accepted2005-10-19T05:47:00.000-04:00
    classvulnerability
    contributors
    • nameAndrew Buttner
      organizationThe MITRE Corporation
    • nameChristine Walzer
      organizationThe MITRE Corporation
    descriptionThe MHTML protocol handler in Microsoft Outlook Express 5.5 SP2 through Outlook Express 6 SP1 allows remote attackers to bypass domain restrictions and execute arbitrary code, as demonstrated on Internet Explorer using script in a compiled help (CHM) file that references the InfoTech Storage (ITS) protocol handlers such as (1) ms-its, (2) ms-itss, (3) its, or (4) mk:@MSITStore, aka the "MHTML URL Processing Vulnerability."
    familywindows
    idoval:org.mitre.oval:def:1028
    statusaccepted
    submitted2004-04-13T12:00:00.000-04:00
    titleMicrosoft Outlook Express v6.0 for Server 2003 MHTML URL Processing Vulnerability
    version66
  • accepted2004-05-25T12:00:00.000-04:00
    classvulnerability
    contributors
    nameAndrew Buttner
    organizationThe MITRE Corporation
    descriptionThe MHTML protocol handler in Microsoft Outlook Express 5.5 SP2 through Outlook Express 6 SP1 allows remote attackers to bypass domain restrictions and execute arbitrary code, as demonstrated on Internet Explorer using script in a compiled help (CHM) file that references the InfoTech Storage (ITS) protocol handlers such as (1) ms-its, (2) ms-itss, (3) its, or (4) mk:@MSITStore, aka the "MHTML URL Processing Vulnerability."
    familywindows
    idoval:org.mitre.oval:def:882
    statusaccepted
    submitted2004-04-13T12:00:00.000-04:00
    titleMicrosoft Outlook Express v5.5,SP2 MHTML URL Processing Vulnerability
    version64
  • accepted2015-08-10T04:01:13.091-04:00
    classvulnerability
    contributors
    • nameAndrew Buttner
      organizationThe MITRE Corporation
    • nameMaria Mikhno
      organizationALTX-SOFT
    definition_extensions
    commentMicrosoft Outlook Express 6.0 for Windows XP/2003 is installed
    ovaloval:org.mitre.oval:def:208
    descriptionThe MHTML protocol handler in Microsoft Outlook Express 5.5 SP2 through Outlook Express 6 SP1 allows remote attackers to bypass domain restrictions and execute arbitrary code, as demonstrated on Internet Explorer using script in a compiled help (CHM) file that references the InfoTech Storage (ITS) protocol handlers such as (1) ms-its, (2) ms-itss, (3) its, or (4) mk:@MSITStore, aka the "MHTML URL Processing Vulnerability."
    familywindows
    idoval:org.mitre.oval:def:990
    statusaccepted
    submitted2004-04-13T12:00:00.000-04:00
    titleMicrosoft Outlook Express v6.0 MHTML URL Processing Vulnerability
    version67