Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2002.676 -- Microsoft Security Bulletin MS02-067 E-mail Header Processing Flaw Could Cause Outlook 2002 to Fail (331866) 05 December 2002 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Outlook 2002 Vendor: Microsoft Operating System: Windows Impact: Denial of Service Access Required: Remote - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- - - ---------------------------------------------------------------------- Title: E-mail Header Processing Flaw Could Cause Outlook 2002 to Fail (331866) Date: 04 December 2002 Software: Microsoft Outlook 2002 Impact: Denial of Service Max Risk: Moderate Bulletin: MS02-067 Microsoft encourages customers to review the Security Bulletins at: http://www.microsoft.com/technet/security/bulletin/MS02-067.asp http://www.microsoft.com/security/security_bulletins/MS02-067.asp - - ---------------------------------------------------------------------- Issue: ====== Microsoft Outlook provides users with the ability to work with e-mail, contacts, tasks, and appointments. Outlook e-mail handling includes receiving, displaying, creating, editing, sending, and organizing e-mail messages. When working with received e-mail messages, Outlook processes information contained in the header of the e-mail which carries information about where the e-mail came from, its destination, and attributes of the message. A vulnerability exists in Outlook 2002 in its processing of e-mail header information. An attacker who successfully exploited the vulnerability could send a specially malformed e-mail to a user of Outlook 2002 that would cause the Outlook client to fail under certain circumstances. The Outlook 2002 client would continue to fail so long as the specially malformed e-mail message remained on the e-mail server. The e-mail message could be deleted by an e-mail administrator, or by the user via another e-mail client such as Outlook Web Access or Outlook Express, after which point the Outlook 2002 client would again function normally. Mitigating Factors: ==================== - Outlook 2002 clients connecting to e-mail servers using the MAPI protocol are not affected. Only Outlook 2002 clients using POP3, IMAP, or WebDAV protocols are vulnerable. - The vulnerability does not affect Outlook 2000 or Outlook Express. - The vulnerability is a denial of service vulnerability only. The attacker would not be able to access the user?s e-mail or system in any way. The vulnerability could not be used to read, delete, create, or alter the user?s e-mail. - If an attacker was able to send a specially malformed e-mail that successfully exploited this vulnerability, the specially malformed e-mail could be deleted either by an e-mail administrator, or by the user via another e-mail client such as Outlook Web Access or Outlook Express. Once the specially malformed e-mail has been removed, normal operation would resume. Risk Rating: ============ - Moderate Patch Availability: =================== - A patch is available to fix this vulnerability. Please read the Security Bulletin at http://www.microsoft.com/technet/security/bulletin/ms02-067.asp for information on obtaining this patch. Acknowledgment: =============== - Richard Lawley - - --------------------------------------------------------------------- THE INFORMATION PROVIDED IN THE MICROSOFT KNOWLEDGE BASE IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND. MICROSOFT DISCLAIMS ALL WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING THE WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. IN NO EVENT SHALL MICROSOFT CORPORATION OR ITS SUPPLIERS BE LIABLE FOR ANY DAMAGES WHATSOEVER INCLUDING DIRECT, INDIRECT, INCIDENTAL, CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR SPECIAL DAMAGES, EVEN IF MICROSOFT CORPORATION OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. SOME STATES DO NOT ALLOW THE EXCLUSION OR LIMITATION OF LIABILITY FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES SO THE FOREGOING LIMITATION MAY NOT APPLY. - -----BEGIN PGP SIGNATURE----- Version: PGP 7.1 iQEVAwUBPe5ejo0ZSRQxA/UrAQGGCwf/fCc/EakgoYYoT0CHxlWV/0xGi7N6/Dr6 d/eEhu8fYujZ2flicJOGD96wOBqhTJoabMNzMQVLQMswgRvvVLewnXolR6EhdGTN AX+XuNYizNOdhJuc5GYHmOl6K9Dr3DnBObXXBf0YqDcdmHssx8XJ5sHKcf/eP/6K t9HevpcNOamjtT20rvu0mcKkrFxb5uwGXWfFl+nHW7faPOp56JTyoKHkQjtLiq1c 33TeDGJOz3Gm6uLZU0juJ9UyNh0GqN2UqjrYn7sMRTOR1si0O/Qr16ZV6rD8Rhn8 V6pH36kXsj7CRVkYlXkEaFnmohy9fghkXTPLTG/DBxqupoI923ywhg== =S3ww - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to use any or all of this information is the responsibility of each user or organisation, and should be done so in accordance with site policies and procedures. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the original authors to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: http://www.auscert.org.au/render.html?cid=1980 If you believe that your system has been compromised, contact AusCERT or your representative in FIRST (Forum of Incident Response and Security Teams). Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. -----BEGIN PGP SIGNATURE----- Version: 2.6.3i Charset: noconv Comment: http://www.auscert.org.au/render.html?it=1967 iQCVAwUBPe89FCh9+71yA2DNAQHY9wP/RrKUvn46BaXX+v9Nv33hVvVagEySFQXO at4aokXkX8OU1woDAfpN2yEc8Bq+lxXXijaCgamy2dWCdWmYQ0YJCgteVDeJCI62 YBu4pMjDU/NYd3rwq2itEtGVuDrSIBBVZKceCXL9H/1U2lNM0jV52Yc1S2qsKIdC wWRYJCaSf5g= =ZFJz -----END PGP SIGNATURE-----