Secunia Advisory SA40566Microsoft Office Outlook Linked Attachment Verification Vulnerability
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Description
A vulnerability has been reported in Microsoft Office Outlook, which can be exploited by malicious people to compromise a user's system. The vulnerability is caused due to an error when verifying attachments that are attached using the ATTACH_BY_REFERENCE value of the PR_ATTACH_METHOD property in a specially crafted e-mail message. This can be exploited to spoof a malicious attachment to appear to not pose a security threat. Successful exploitation allows execution of arbitrary code if a user is tricked into opening the attachment. Solution Provided and/or discovered by Other references Alternate/detailed remediation Deep Links Do you have additional information related to this advisory?Please provide information about patches, mitigating factors, new versions, exploits, faulty patches, links, and other relevant data by posting comments to this Advisory. You can also send this information to vuln@secunia.com
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||