Vulnerabilities > CVE-2007-1658 - Local File Execution vulnerability in Microsoft Windows Vista Windows Mail
Attack vector
NETWORK Attack complexity
MEDIUM Privileges required
NONE Confidentiality impact
COMPLETE Integrity impact
COMPLETE Availability impact
COMPLETE Summary
Windows Mail in Microsoft Windows Vista might allow user-assisted remote attackers to execute certain programs via a link to a (1) local file or (2) UNC share pathname in which there is a directory with the same base name as an executable program at the same level, as demonstrated using C:/windows/system32/winrm (winrm.cmd) and migwiz (migwiz.exe).
Vulnerable Configurations
Part | Description | Count |
---|---|---|
OS | 5 |
Exploit-Db
description | Microsoft Windows Vista Windows Mail Local File Execution Vulnerability. CVE-2007-1658 . Remote exploit for windows platform |
id | EDB-ID:29771 |
last seen | 2016-02-03 |
modified | 2007-03-23 |
published | 2007-03-23 |
reporter | kingcope |
source | https://www.exploit-db.com/download/29771/ |
title | Microsoft Windows Vista Windows Mail Local File Execution Vulnerability |
Nessus
NASL family | Windows : Microsoft Bulletins |
NASL id | SMB_NT_MS07-034.NASL |
description | The remote host is running a version of Microsoft Outlook Express with several security flaws that could allow an attacker to execute arbitrary code on the remote host. To exploit this flaw, an attacker would need to send a malformed email to a victim on the remote host and have him open it. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 25487 |
published | 2007-06-12 |
reporter | This script is Copyright (C) 2007-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/25487 |
title | MS07-034: Cumulative Security Update for Outlook Express and Windows Mail (929123) |
code |
|
Oval
accepted | 2014-03-17T04:00:14.554-04:00 | ||||||||
class | vulnerability | ||||||||
contributors |
| ||||||||
definition_extensions |
| ||||||||
description | Windows Mail in Microsoft Windows Vista might allow user-assisted remote attackers to execute certain programs via a link to a (1) local file or (2) UNC share pathname in which there is a directory with the same base name as an executable program at the same level, as demonstrated using C:/windows/system32/winrm (winrm.cmd) and migwiz (migwiz.exe). | ||||||||
family | windows | ||||||||
id | oval:org.mitre.oval:def:1861 | ||||||||
status | accepted | ||||||||
submitted | 2007-06-13T08:22:59.000-04:00 | ||||||||
title | Windows Mail UNC Navigation Request Remote Code Execution Vulnerability | ||||||||
version | 72 |
References
- http://archives.neohapsis.com/archives/fulldisclosure/2007-03/0344.html
- http://archives.neohapsis.com/archives/fulldisclosure/2007-03/0345.html
- http://archives.neohapsis.com/archives/fulldisclosure/2007-03/0346.html
- http://isc.sans.org/diary.html?storyid=2507
- http://news.com.com/2100-1002_3-6170133.html
- http://secunia.com/advisories/25639
- http://www.computerworld.com/action/article.do?command=viewArticleBasic&articleId=9014194
- http://www.securityfocus.com/archive/1/471947/100/0/threaded
- http://www.securityfocus.com/bid/23103
- http://www.securitytracker.com/id?1017816
- http://www.us-cert.gov/cas/techalerts/TA07-163A.html
- http://www.vupen.com/english/advisories/2007/2154
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-034
- https://exchange.xforce.ibmcloud.com/vulnerabilities/33167
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1861