Vulnerabilities > CVE-2007-2227 - Information Disclosure vulnerability in Microsoft Outlook Express and Windows Mail
Attack vector
NETWORK Attack complexity
MEDIUM Privileges required
NONE Confidentiality impact
PARTIAL Integrity impact
NONE Availability impact
NONE Summary
The MHTML protocol handler in Microsoft Outlook Express 6 and Windows Mail in Windows Vista does not properly handle Content-Disposition "notifications," which allows remote attackers to obtain sensitive information from other Internet Explorer domains, aka "Content Disposition Parsing Cross Domain Information Disclosure Vulnerability."
Vulnerable Configurations
Part | Description | Count |
---|---|---|
OS | 10 | |
Application | 2 |
Nessus
NASL family | Windows : Microsoft Bulletins |
NASL id | SMB_NT_MS07-034.NASL |
description | The remote host is running a version of Microsoft Outlook Express with several security flaws that could allow an attacker to execute arbitrary code on the remote host. To exploit this flaw, an attacker would need to send a malformed email to a victim on the remote host and have him open it. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 25487 |
published | 2007-06-12 |
reporter | This script is Copyright (C) 2007-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/25487 |
title | MS07-034: Cumulative Security Update for Outlook Express and Windows Mail (929123) |
code |
|
Oval
accepted | 2012-09-10T04:00:47.213-04:00 | ||||||||||||||||||||||||||||||||||||||||
class | vulnerability | ||||||||||||||||||||||||||||||||||||||||
contributors |
| ||||||||||||||||||||||||||||||||||||||||
definition_extensions |
| ||||||||||||||||||||||||||||||||||||||||
description | The MHTML protocol handler in Microsoft Outlook Express 6 and Windows Mail in Windows Vista does not properly handle Content-Disposition "notifications," which allows remote attackers to obtain sensitive information from other Internet Explorer domains, aka "Content Disposition Parsing Cross Domain Information Disclosure Vulnerability." | ||||||||||||||||||||||||||||||||||||||||
family | windows | ||||||||||||||||||||||||||||||||||||||||
id | oval:org.mitre.oval:def:2085 | ||||||||||||||||||||||||||||||||||||||||
status | accepted | ||||||||||||||||||||||||||||||||||||||||
submitted | 2007-06-13T08:22:59.000-04:00 | ||||||||||||||||||||||||||||||||||||||||
title | Content Disposition Parsing Cross Domain Information Disclosure Vulnerability | ||||||||||||||||||||||||||||||||||||||||
version | 71 |
Seebug
bulletinFamily | exploit |
description | BUGTRAQ ID: 24410 CVE(CAN) ID: CVE-2007-2227 Outlook Express是Microsoft Windows操作系统捆绑的邮件和新闻组客户端。 MHTML协议处理程序将内容处置通知传递回Internet Explorer的方式中存在一个信息泄露漏洞,可能允许攻击者绕过Internet Explorer中的文件下载对话框。 攻击者可以通过构建特制的网页来利用该漏洞。如果用户使用Internet Explorer查看了该网页,漏洞就可能允许信息泄露。成功利用此漏洞的攻击者可以读取另一个Internet Explorer域中的数据。 Microsoft Outlook Express 6.0 Microsoft Windows Mail 临时解决方法: * 禁用MHTML协议处理程序: 1. 单击“开始”,然后单击“运行 ”。在文本框中输入regedit.exe,然后单击“确定”。 2. 导航到HKEY_CLASSES_ROOT\CLSID\{05300401-BCBC-11d0-85E3-00C04FD85AB4}。 3. 右键单击{05300401-BCBC-11d0-85E3-00C04FD85AB4},然后选择“权限”。 4. 单击“高级”。 5. 取消选中“允许将来自父级的可继承权限传播给该对象 6. 单击“删除”,然后单击“确定”。 在后续屏幕上单击“是”和“确定”。 * 将Internet和本地intranet安全区设置为“高”以在运行活动脚本之前要求提示。 厂商补丁: Microsoft --------- Microsoft已经为此发布了一个安全公告(MS07-034)以及相应补丁: MS07-034:Cumulative Security Update for Outlook Express and Windows Mail (929123) 链接:<a href=http://www.microsoft.com/technet/security/Bulletin/ms07-034.mspx?pf=true target=_blank>http://www.microsoft.com/technet/security/Bulletin/ms07-034.mspx?pf=true</a> |
id | SSV:2682 |
last seen | 2017-11-19 |
modified | 2007-12-26 |
published | 2007-12-26 |
reporter | Root |
title | Microsoft Outlook Express内容处置解析跨域信息泄露漏洞(MS07-034) |
References
- http://archive.openmya.devnull.jp/2007.06/msg00060.html
- http://openmya.hacker.jp/hasegawa/security/ms07-034.txt
- http://osvdb.org/35346
- http://secunia.com/advisories/25639
- http://www.securityfocus.com/archive/1/471947/100/0/threaded
- http://www.securityfocus.com/archive/1/472002/100/0/threaded
- http://www.securityfocus.com/bid/24410
- http://www.securitytracker.com/id?1018233
- http://www.securitytracker.com/id?1018234
- http://www.us-cert.gov/cas/techalerts/TA07-163A.html
- http://www.vupen.com/english/advisories/2007/2154
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-034
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2085