Secunia Advisory SA39766Outlook Express / Windows Mail STAT Response Integer Overflow
|
||||
Description
Francis Provencher has discovered a vulnerability in Microsoft Outlook Express and Windows Mail, which can be exploited by malicious people to potentially compromise a user's system. The vulnerability is caused due to an integer overflow when processing responses received from a POP3 server. This can be exploited to dereference out-of-bounds memory and potentially trigger a memory corruption via a specially crafted STAT response. Successful exploitation may allow execution of arbitrary code, but requires that the user is tricked into connecting to a malicious POP3 server. The vulnerability is confirmed in Outlook Express on a fully patched Windows 2000, Windows XP SP3, and Windows Server 2003, and in Windows Mail on a fully patched Windows Server 2008. Windows Mail in Windows Vista is also reportedly affected. Solution Provided and/or discovered by Other references Technical Analysis Deep Links Do you have additional information related to this advisory?Please provide information about patches, mitigating factors, new versions, exploits, faulty patches, links, and other relevant data by posting comments to this Advisory. You can also send this information to vuln@secunia.com
|
||||
Debian update for phpgroupware |