Microsoft Outlook Express 4.x/5.x/6.0 Plaintext Email Security Policy Bypass Vulnerability
2004-10-18T00:00:00
ID EDB-ID:24687 Type exploitdb Reporter http-equiv Modified 2004-10-18T00:00:00
Description
Microsoft Outlook Express 4.x/5.x/6.0 Plaintext Email Security Policy Bypass Vulnerability. Remote exploit for windows platform
source: http://www.securityfocus.com/bid/11447/info
Microsoft Outlook Express is reported prone to a security policy bypass vulnerability.
The vulnerability presents itself if an attached image file is referenced using a specially crafted CID URI.
This will result in a policy bypass because the image will be automatically rendered when the email is viewed in Outlook Express.
<CENTER><IMG SRC="CID:{F69034DE-F779-4AA2-B5A9-
7413133C2A29}/malware.JPG"></CENTER>
{"id": "EDB-ID:24687", "hash": "f5ca59bebe7029f2051718fe39e26217", "type": "exploitdb", "bulletinFamily": "exploit", "title": "Microsoft Outlook Express 4.x/5.x/6.0 Plaintext Email Security Policy Bypass Vulnerability", "description": "Microsoft Outlook Express 4.x/5.x/6.0 Plaintext Email Security Policy Bypass Vulnerability. Remote exploit for windows platform", "published": "2004-10-18T00:00:00", "modified": "2004-10-18T00:00:00", "cvss": {"score": 0.0, "vector": "NONE"}, "href": "https://www.exploit-db.com/exploits/24687/", "reporter": "http-equiv", "references": [], "cvelist": [], "lastseen": "2016-02-02T23:48:54", "history": [], "viewCount": 0, "enchantments": {"score": {"value": -0.2, "vector": "NONE", "modified": "2016-02-02T23:48:54"}, "dependencies": {"references": [], "modified": "2016-02-02T23:48:54"}, "vulnersScore": -0.2}, "objectVersion": "1.4", "sourceHref": "https://www.exploit-db.com/download/24687/", "sourceData": "source: http://www.securityfocus.com/bid/11447/info\r\n\r\nMicrosoft Outlook Express is reported prone to a security policy bypass vulnerability.\r\n\r\nThe vulnerability presents itself if an attached image file is referenced using a specially crafted CID URI.\r\n\r\nThis will result in a policy bypass because the image will be automatically rendered when the email is viewed in Outlook Express.\r\n\r\n<CENTER><IMG SRC=\"CID:{F69034DE-F779-4AA2-B5A9-\r\n7413133C2A29}/malware.JPG\"></CENTER>", "osvdbidlist": ["11051"], "_object_type": "robots.models.exploitdb.ExploitDbBulletin", "_object_types": ["robots.models.exploitdb.ExploitDbBulletin", "robots.models.base.Bulletin"]}