Lucene search

K
certCERTVU:252146
HistoryJan 10, 2006 - 12:00 a.m.

Microsoft Outlook and Microsoft Exchange TNEF decoding buffer overflow

2006-01-1000:00:00
www.kb.cert.org
35

0.937 High

EPSS

Percentile

99.1%

Overview

Microsoft Outlook and Microsoft Exchange contain a buffer overflow vulnerability that may allow a remote, unauthenticated attacker to execute arbitrary code on a system running the vulnerable software.

Description

Transport Neutral Encapsulation Format (TNEF)

TNEF is a proprietary Microsoft format for encoding rich text email messages. Microsoft Outlook and Microsoft Exchange support the use of TNEF-encoded messages.

The problem

Microsoft Outlook and Microsoft Exchange do not properly validate TNEF MIME attachments, potentially allowing a buffer overflow to occur. The overflow occurs in in the process that decodes TNEF MIME attachments. A remote attacker may be able trigger the buffer overflow by sending a specially crafted TNEF MIME attachment to a vulnerable Outlook or Exchange installation.

Note that on user workstations, exploitation may require a user to open or preview a malicious mail message in Outlook. However, on Exchange servers, this vulnerability can be exploited without human interaction.

For more information, please see Microsoft Security Bulletin MS06-003.


Impact

A remote unauthenticated attacker may be able to execute arbitrary code on a system running the vulnerable software. Microsoft Outlook can trigger the vulnerability when it opens or displays a preview for a specially crafted message. Microsoft Exchange can trigger the vulnerability when it processes a specially crafted message.


Solution

Apply a patch from your vendor
Microsoft addresses this vulnerability with the updates listed in Microsoft Security Bulletin MS06-003.


Workarounds

Microsoft has listed several workarounds in Microsoft Security Bulletin MS06-003, including blocking attachments with the MIME type of application/ms-tnef.


Vendor Information

252146

Filter by status: All Affected Not Affected Unknown

Filter by content: __ Additional information available

__ Sort by: Status Alphabetical

Expand all

Javascript is disabled. Click here to view vendors.

Microsoft Corporation __ Affected

Updated: January 10, 2006

Status

Affected

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

Please see Microsoft Security Bulletin MS06-003.

If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23252146 Feedback>).

CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

Acknowledgements

This vulnerability was reported by Microsoft, who in turn credit John Heasman and Mark Litchfield of NGS Software.

This document was written by Will Dormann and Jeff Gennari.

Other Information

CVE IDs: CVE-2006-0002
Severity Metric: 25.52 Date Public:

0.937 High

EPSS

Percentile

99.1%