Secunia Advisory SA39766

Outlook Express / Windows Mail STAT Response Integer Overflow
Secunia Advisory SA39766
Release Date 2010-05-11
   
Popularity 3,155 views
Comments 0 comments

Criticality level Less criticalLess critical
Impact System access
Where From remote
Authentication level Available in Customer Area
   
Report reliability Available in Customer Area
Solution Status Vendor Patch
   
   
3rd party PoC/exploit Link available in Customer Area
Systems affected Available in Customer Area
Approve distribution Available in Customer Area
Remediation status Secunia CSI, Secunia PSI
Automated scanning Secunia CSI, Secunia PSI
   
Operating System
Microsoft Windows 2000 Advanced Server
Microsoft Windows 2000 Datacenter Server
Microsoft Windows 2000 Professional
Microsoft Windows 2000 Server
Microsoft Windows 7
Microsoft Windows Server 2003 Datacenter Edition
Microsoft Windows Server 2003 Enterprise Edition
Microsoft Windows Server 2003 Standard Edition
Microsoft Windows Server 2003 Web Edition
Microsoft Windows Server 2008
Microsoft Windows Storage Server 2003
Microsoft Windows Vista
Microsoft Windows XP Home Edition
Microsoft Windows XP Professional

Software:
Microsoft Outlook Express 6
Windows Live Mail

Secunia CVSS Score Available in Customer Area
CVE Reference(s) CVE-2010-0816 CVSS available in Customer Area
  

Description
Francis Provencher has discovered a vulnerability in Microsoft Outlook Express and Windows Mail, which can be exploited by malicious people to potentially compromise a user's system.

The vulnerability is caused due to an integer overflow when processing responses received from a POP3 server. This can be exploited to dereference out-of-bounds memory and potentially trigger a memory corruption via a specially crafted STAT response.

Successful exploitation may allow execution of arbitrary code, but requires that the user is tricked into connecting to a malicious POP3 server.

The vulnerability is confirmed in Outlook Express on a fully patched Windows 2000, Windows XP SP3, and Windows Server 2003, and in Windows Mail on a fully patched Windows Server 2008. Windows Mail in Windows Vista is also reportedly affected.

Solution
Apply patches.
Further details available in Customer Area

Provided and/or discovered by
Francis Provencher, Protek Research Lab's.

Changelog
Further details available in Customer Area

Original Advisory
MS10-030 (KB978542):
http://www.microsoft.com/technet/security/bulletin/ms10-030.mspx

Francis Provencher:
http://www.protekresearchlab.com/index.php?option=com_content&view=article&id=13&Itemid=13

Other references
Further details available in Customer Area

Technical Analysis
Further details available in Customer Area

Deep Links
Links available in Customer Area


Do you have additional information related to this advisory?
Please provide information about patches, mitigating factors, new versions, exploits, faulty patches, links, and other relevant data by posting comments to this Advisory. You can also send this information to vuln@secunia.com
Subject: Outlook Express / Windows Mail STAT Response Integer Overflow
 
No posts yet

-

You must be logged in to post a comment.



footer
© 2002-2010 Secunia ApS • Weidekampsgade 14A, DK-2300 Copenhagen S, Denmark • +45 7020 5144 • Contact Us
Terms & Conditions and CopyrightReport vulnerability
CVE logo OTA logo First logo