[Esd-l] Outlook 2003 exploit using active scripting.

Joe Steele joe at madewell.com
Wed May 19 16:50:27 PDT 2004


On Wednesday, May 19, 2004 11:18 AM, Smart,Dan wrote:
>
> John:
> Do you have a suggestion on how to handle this new Outlook 2003
> vulnerability?  See:
>
> http://secunia.com/advisories/11629/
>

I had wondered about this myself when it appeared on bugtraq a couple 
days ago:

http://www.securityfocus.com/archive/1/363596

I haven't studied the sample message (I didn't want to open it in 
Outlook, and I'm not sure how to open it otherwise), but I suspect 
that it sends itself as an "application/ms-tnef" MIME type (based on 
a little experimenting with embedding objects in a RTF Outlook 
message).  If this is indeed true, then defining 
"SECURITY_STRIP_MSTNEF" should be sufficient protection.  Would 
anyone care to confirm that this is how the sample message sends 
itself?

--Joe


More information about the esd-l mailing list