Microsoft Security Bulletin MS02-067: E-mail Header Processing Flaw Could Cause Outlook 2002 to Fail (331866)

2002-12-09T00:00:00
ID SECURITYVULNS:DOC:3840
Type securityvulns
Reporter Securityvulns
Modified 2002-12-09T00:00:00

Description

-----BEGIN PGP SIGNED MESSAGE-----


Title: E-mail Header Processing Flaw Could Cause Outlook 2002 to Fail (331866) Date: 04 December 2002 Software: Microsoft Outlook 2002 Impact: Denial of Service Max Risk: Moderate Bulletin: MS02-067

Microsoft encourages customers to review the Security Bulletins at: http://www.microsoft.com/technet/security/bulletin/MS02-067.asp http://www.microsoft.com/security/security_bulletins/MS02-067.asp


Issue:

Microsoft Outlook provides users with the ability to work with e-mail, contacts, tasks, and appointments. Outlook e-mail handling includes receiving, displaying, creating, editing, sending, and organizing e-mail messages. When working with received e-mail messages, Outlook processes information contained in the header of the e-mail which carries information about where the e-mail came from, its destination, and attributes of the message.

A vulnerability exists in Outlook 2002 in its processing of e-mail header information. An attacker who successfully exploited the vulnerability could send a specially malformed e-mail to a user of Outlook 2002 that would cause the Outlook client to fail under certain circumstances. The Outlook 2002 client would continue to fail so long as the specially malformed e-mail message remained on the e-mail server. The e-mail message could be deleted by an e-mail administrator, or by the user via another e-mail client such as Outlook Web Access or Outlook Express, after which point the Outlook 2002 client would again function normally.

Mitigating Factors:

  • Outlook 2002 clients connecting to e-mail servers using the MAPI protocol are not affected. Only Outlook 2002 clients using POP3, IMAP, or WebDAV protocols are vulnerable.

  • The vulnerability does not affect Outlook 2000 or Outlook Express.

  • The vulnerability is a denial of service vulnerability only. The attacker would not be able to access the user?s e-mail or system in any way. The vulnerability could not be used to read, delete, create, or alter the user?s e-mail.

  • If an attacker was able to send a specially malformed e-mail that successfully exploited this vulnerability, the specially malformed e-mail could be deleted either by an e-mail administrator, or by the user via another e-mail client such as Outlook Web Access or Outlook Express. Once the specially malformed e-mail has been removed, normal operation would resume.

Risk Rating:

  • Moderate

Patch Availability:

  • A patch is available to fix this vulnerability. Please read the Security Bulletin at http://www.microsoft.com/technet/security/bulletin/ms02-067.asp for information on obtaining this patch.

Acknowledgment:

  • Richard Lawley

THE INFORMATION PROVIDED IN THE MICROSOFT KNOWLEDGE BASE IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND. MICROSOFT DISCLAIMS ALL WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING THE WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. IN NO EVENT SHALL MICROSOFT CORPORATION OR ITS SUPPLIERS BE LIABLE FOR ANY DAMAGES WHATSOEVER INCLUDING DIRECT, INDIRECT, INCIDENTAL, CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR SPECIAL DAMAGES, EVEN IF MICROSOFT CORPORATION OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. SOME STATES DO NOT ALLOW THE EXCLUSION OR LIMITATION OF LIABILITY FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES SO THE FOREGOING LIMITATION MAY NOT APPLY.

-----BEGIN PGP SIGNATURE----- Version: PGP 7.1

iQEVAwUBPe5ejo0ZSRQxA/UrAQGGCwf/fCc/EakgoYYoT0CHxlWV/0xGi7N6/Dr6 d/eEhu8fYujZ2flicJOGD96wOBqhTJoabMNzMQVLQMswgRvvVLewnXolR6EhdGTN AX+XuNYizNOdhJuc5GYHmOl6K9Dr3DnBObXXBf0YqDcdmHssx8XJ5sHKcf/eP/6K t9HevpcNOamjtT20rvu0mcKkrFxb5uwGXWfFl+nHW7faPOp56JTyoKHkQjtLiq1c 33TeDGJOz3Gm6uLZU0juJ9UyNh0GqN2UqjrYn7sMRTOR1si0O/Qr16ZV6rD8Rhn8 V6pH36kXsj7CRVkYlXkEaFnmohy9fghkXTPLTG/DBxqupoI923ywhg== =S3ww -----END PGP SIGNATURE-----


You have received this e-mail bulletin because of your subscription to the Microsoft Product Security Notification Service. For more information on this service, please visit http://www.microsoft.com/technet/security/notify.asp.

To verify the digital signature on this bulletin, please download our PGP key at http://www.microsoft.com/technet/security/notify.asp.

To unsubscribe from the Microsoft Security Notification Service, please visit the Microsoft Profile Center at http://register.microsoft.com/regsys/pic.asp

If you do not wish to use Microsoft Passport, you can unsubscribe from the Microsoft Security Notification Service via email as described below: Reply to this message with the word UNSUBSCRIBE in the Subject line.

For security-related information about Microsoft products, please visit the Microsoft Security Advisor web site at http://www.microsoft.com/security.