Vulnerabilities > CVE-2007-2225 - Information Disclosure vulnerability in Microsoft Outlook Express and Windows Mail
Attack vector
NETWORK Attack complexity
MEDIUM Privileges required
NONE Confidentiality impact
PARTIAL Integrity impact
NONE Availability impact
NONE Summary
A component in Microsoft Outlook Express 6 and Windows Mail in Windows Vista does not properly handle certain HTTP headers when processing MHTML protocol URLs, which allows remote attackers to obtain sensitive information from other Internet Explorer domains, aka "URL Parsing Cross Domain Information Disclosure Vulnerability."
Vulnerable Configurations
Part | Description | Count |
---|---|---|
OS | 10 | |
Application | 2 |
Nessus
NASL family | Windows : Microsoft Bulletins |
NASL id | SMB_NT_MS07-034.NASL |
description | The remote host is running a version of Microsoft Outlook Express with several security flaws that could allow an attacker to execute arbitrary code on the remote host. To exploit this flaw, an attacker would need to send a malformed email to a victim on the remote host and have him open it. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 25487 |
published | 2007-06-12 |
reporter | This script is Copyright (C) 2007-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/25487 |
title | MS07-034: Cumulative Security Update for Outlook Express and Windows Mail (929123) |
code |
|
Oval
accepted | 2012-09-10T04:00:46.413-04:00 | ||||||||||||||||||||||||||||||||||||||||
class | vulnerability | ||||||||||||||||||||||||||||||||||||||||
contributors |
| ||||||||||||||||||||||||||||||||||||||||
definition_extensions |
| ||||||||||||||||||||||||||||||||||||||||
description | A component in Microsoft Outlook Express 6 and Windows Mail in Windows Vista does not properly handle certain HTTP headers when processing MHTML protocol URLs, which allows remote attackers to obtain sensitive information from other Internet Explorer domains, aka "URL Parsing Cross Domain Information Disclosure Vulnerability." | ||||||||||||||||||||||||||||||||||||||||
family | windows | ||||||||||||||||||||||||||||||||||||||||
id | oval:org.mitre.oval:def:2045 | ||||||||||||||||||||||||||||||||||||||||
status | accepted | ||||||||||||||||||||||||||||||||||||||||
submitted | 2007-06-13T08:22:59.000-04:00 | ||||||||||||||||||||||||||||||||||||||||
title | URL Parsing Cross Domain Information Disclosure Vulnerability | ||||||||||||||||||||||||||||||||||||||||
version | 71 |
Seebug
bulletinFamily | exploit |
description | BUGTRAQ ID: 24392 CVE(CAN) ID: CVE-2007-2225 Outlook Express是Microsoft Windows操作系统捆绑的邮件和新闻组客户端。 Windows的MHTML协议处理器在返回MHTML内容时没有正确的解释HTTP头,这可能允许Internet Explorer绕过域限制。 攻击者可以通过构建特制的网页来利用该漏洞。如果用户使用Internet Explorer查看网页,该漏洞可能允许信息泄露。成功利用此漏洞的攻击者可以读取另一个Internet Explorer域中的数据。 Microsoft Outlook Express 6.0 Microsoft Windows Mail 临时解决方法: * 禁用MHTML协议处理程序: 1. 单击“开始”,然后单击“运行 ”。在文本框中输入regedit.exe,然后单击“确定”。 2. 导航到HKEY_CLASSES_ROOT\CLSID\{05300401-BCBC-11d0-85E3-00C04FD85AB4}。 3. 右键单击{05300401-BCBC-11d0-85E3-00C04FD85AB4},然后选择“权限”。 4. 单击“高级”。 5. 取消选中“允许将来自父级的可继承权限传播给该对象 6. 单击“删除”,然后单击“确定”。 在后续屏幕上单击“是”和“确定”。 * 将Internet和本地intranet安全区设置为“高”以在运行活动脚本之前要求提示。 厂商补丁: Microsoft --------- Microsoft已经为此发布了一个安全公告(MS07-034)以及相应补丁: MS07-034:Cumulative Security Update for Outlook Express and Windows Mail (929123) 链接:<a href=http://www.microsoft.com/technet/security/Bulletin/ms07-034.mspx?pf=true target=_blank>http://www.microsoft.com/technet/security/Bulletin/ms07-034.mspx?pf=true</a> |
id | SSV:2681 |
last seen | 2017-11-19 |
modified | 2007-12-26 |
published | 2007-12-26 |
reporter | Root |
title | Microsoft Outlook Express MHTML URL解析信息泄露漏洞(MS07-034) |
References
- http://archive.openmya.devnull.jp/2007.06/msg00060.html
- http://openmya.hacker.jp/hasegawa/security/ms07-034.txt
- http://osvdb.org/35345
- http://secunia.com/advisories/25639
- http://www.kb.cert.org/vuls/id/682825
- http://www.securityfocus.com/archive/1/471947/100/0/threaded
- http://www.securityfocus.com/archive/1/472002/100/0/threaded
- http://www.securityfocus.com/bid/24392
- http://www.securitytracker.com/id?1018231
- http://www.securitytracker.com/id?1018232
- http://www.us-cert.gov/cas/techalerts/TA07-163A.html
- http://www.vupen.com/english/advisories/2007/2154
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-034
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2045