Microsoft Outlook RTF Embedded Object Security Bypass
2004-05-17T16:30:53
ID OSVDB:6217 Type osvdb Reporter http-equiv(http-equiv@excite.com
) Modified 2004-05-17T16:30:53
Description
Vulnerability Description
Microsoft Outlook 2003 contains a flaw that may allow a remote attacker to bypass security setting. By embedding an OLE object with reference to a Windows media file in a RTF message, a remote attacker could be able to start a download sequence of arbitrary files, which normally causes Internet Explorer to prompt whether to download the file. It is possible that the flaw may allow the launch of arbitrary files without any warning, resulting in a loss of integrity.
Solution Description
Currently, there are no known upgrades, patches, or workarounds available to correct this issue.
Short Description
Microsoft Outlook 2003 contains a flaw that may allow a remote attacker to bypass security setting. By embedding an OLE object with reference to a Windows media file in a RTF message, a remote attacker could be able to start a download sequence of arbitrary files, which normally causes Internet Explorer to prompt whether to download the file. It is possible that the flaw may allow the launch of arbitrary files without any warning, resulting in a loss of integrity.
References:
Secunia Advisory ID:11629Related OSVDB ID: 6079Related OSVDB ID: 5998
Mail List Post: http://archives.neohapsis.com/archives/fulldisclosure/2004-05/0885.html
ISS X-Force ID: 16173
Generic Informational URL: http://www.malware.com/rockitman.png
Generic Exploit URL: http://www.malware.com/rockIT.zip
CVE-2004-0503
Bugtraq ID: 10369
{"type": "osvdb", "published": "2004-05-17T16:30:53", "href": "https://vulners.com/osvdb/OSVDB:6217", "bulletinFamily": "software", "cvss": {"vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:PARTIAL/A:NONE/", "score": 5.0}, "viewCount": 1, "edition": 1, "reporter": "http-equiv(http-equiv@excite.com\n)", "title": "Microsoft Outlook RTF Embedded Object Security Bypass", "affectedSoftware": [{"operator": "eq", "version": "2003 Small Business Edition", "name": "Outlook"}, {"operator": "eq", "version": "2003 Student and Teacher Edition", "name": "Outlook"}, {"operator": "eq", "version": "2003", "name": "Outlook"}, {"operator": "eq", "version": "2003 Standard Edition", "name": "Outlook"}, {"operator": "eq", "version": "2003 Professional Edition", "name": "Outlook"}], "enchantments": {"score": {"value": 5.6, "vector": "NONE", "modified": "2017-04-28T13:20:01", "rev": 2}, "dependencies": {"references": [{"type": "cve", "idList": ["CVE-2004-0503"]}], "modified": "2017-04-28T13:20:01", "rev": 2}, "vulnersScore": 5.6}, "references": [], "id": "OSVDB:6217", "lastseen": "2017-04-28T13:20:01", "cvelist": ["CVE-2004-0503"], "modified": "2004-05-17T16:30:53", "description": "## Vulnerability Description\nMicrosoft Outlook 2003 contains a flaw that may allow a remote attacker to bypass security setting. By embedding an OLE object with reference to a Windows media file in a RTF message, a remote attacker could be able to start a download sequence of arbitrary files, which normally causes Internet Explorer to prompt whether to download the file. It is possible that the flaw may allow the launch of arbitrary files without any warning, resulting in a loss of integrity.\n## Solution Description\nCurrently, there are no known upgrades, patches, or workarounds available to correct this issue.\n## Short Description\nMicrosoft Outlook 2003 contains a flaw that may allow a remote attacker to bypass security setting. By embedding an OLE object with reference to a Windows media file in a RTF message, a remote attacker could be able to start a download sequence of arbitrary files, which normally causes Internet Explorer to prompt whether to download the file. It is possible that the flaw may allow the launch of arbitrary files without any warning, resulting in a loss of integrity.\n## References:\n[Secunia Advisory ID:11629](https://secuniaresearch.flexerasoftware.com/advisories/11629/)\n[Related OSVDB ID: 6079](https://vulners.com/osvdb/OSVDB:6079)\n[Related OSVDB ID: 5998](https://vulners.com/osvdb/OSVDB:5998)\nMail List Post: http://archives.neohapsis.com/archives/fulldisclosure/2004-05/0885.html\nISS X-Force ID: 16173\nGeneric Informational URL: http://www.malware.com/rockitman.png\nGeneric Exploit URL: http://www.malware.com/rockIT.zip\n[CVE-2004-0503](https://vulners.com/cve/CVE-2004-0503)\nBugtraq ID: 10369\n"}
{"cve": [{"lastseen": "2021-02-02T05:22:58", "description": "Microsoft Outlook 2003 allows remote attackers to bypass the default zone restrictions and execute script within media files via a Rich Text Format (RTF) message containing an OLE object for the Windows Media Player, which bypasses Media Player's setting to disallow scripting and may lead to unprompted installation of an executable when exploited in conjunction with predictable-file-location exposures such as CVE-2004-0502.", "edition": 4, "cvss3": {}, "published": "2004-08-18T04:00:00", "title": "CVE-2004-0503", "type": "cve", "cwe": ["NVD-CWE-Other"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2004-0503"], "modified": "2017-07-11T01:30:00", "cpe": ["cpe:/a:microsoft:outlook:2003"], "id": "CVE-2004-0503", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2004-0503", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:P/A:N"}, "cpe23": ["cpe:2.3:a:microsoft:outlook:2003:*:*:*:*:*:*:*"]}]}