Anti-Spyware Forums


Reply
Thread Tools Display Modes

Outlook Express - Windows Mail - Windows Live Mail - critical vulnerability

 
 
MEB
Guest
Posts: n/a

 
      17-05-2010, 04:35 PM

The exploit vector apparently uses inetcomm.dll vulnerabilities. Other
vulnerabilities [per previous/other] include various other base files.

Examples of how this vulnerability might work or could affect your
usage would include entering/accessing a site which opens the affected
applications via server code or page inclusion, connecting to a forum or
news server via email or NNTP, and similar situations wherein OE, WM,
WLM, might be used or called.

Present:

Microsoft Security Bulletin MS10-030 - Critical
Vulnerability in Outlook Express and Windows Mail Could Allow Remote
Code Execution (978542)
http://www.microsoft.com/technet/sec.../MS10-030.mspx

MS10-030: Vulnerability in Outlook Express and Windows Mail could allow
remote code execution
http://support.microsoft.com/?kbid=978542


Win9X:

This issue comes to Win9X for a very simple reason, the base OE [and
IE] files left/used may contain a [actually several] severe
vulnerability{ies} which could allow the system to be taken over or
otherwise hacked. Of course the updates offered are not compiled for use
within Win9X since it is EOL/EOS.

Any Win9X users that still use OE should review the prior issues and
this present vulnerability, particularly as there is no necessity for
elevation of privileges, or creation of new accounts. Any offered "proof
of concept" exploits would/are designed for usage in systems which would
require that activity [NTs] hence would likely fail in Win9X. That does
not mean this might not still be accomplished without using the extra
necessities for the NT based systems.

--
MEB
http://peoplescounsel.org/ref/windows-main.htm
Windows Info, Diagnostics, Security, Networking
http://peoplescounsel.org
The "real world" of Law, Justice, and Government
___---
 
Reply With Quote
 
 
 
 
PA Bear [MS MVP]
Guest
Posts: n/a

 
      17-05-2010, 05:18 PM
If you access your account's POP3 and SMTP servers via SSL in OE (or OL),
your computer is not subject to this vulnerability.
--
~Robear Dyer (PA Bear)
MS MVP-IE, Mail, Security, Windows Client - since 2002


MEB wrote:
> The exploit vector apparently uses inetcomm.dll vulnerabilities. Other
> vulnerabilities [per previous/other] include various other base files.
>
> Examples of how this vulnerability might work or could affect your
> usage would include entering/accessing a site which opens the affected
> applications via server code or page inclusion, connecting to a forum or
> news server via email or NNTP, and similar situations wherein OE, WM,
> WLM, might be used or called.
>
> Present:
>
> Microsoft Security Bulletin MS10-030 - Critical
> Vulnerability in Outlook Express and Windows Mail Could Allow Remote
> Code Execution (978542)
> http://www.microsoft.com/technet/sec.../MS10-030.mspx
>
> MS10-030: Vulnerability in Outlook Express and Windows Mail could allow
> remote code execution
> http://support.microsoft.com/?kbid=978542
>
>
> Win9X:
>
> This issue comes to Win9X for a very simple reason, the base OE [and
> IE] files left/used may contain a [actually several] severe
> vulnerability{ies} which could allow the system to be taken over or
> otherwise hacked. Of course the updates offered are not compiled for use
> within Win9X since it is EOL/EOS.
>
> Any Win9X users that still use OE should review the prior issues and
> this present vulnerability, particularly as there is no necessity for
> elevation of privileges, or creation of new accounts. Any offered "proof
> of concept" exploits would/are designed for usage in systems which would
> require that activity [NTs] hence would likely fail in Win9X. That does
> not mean this might not still be accomplished without using the extra
> necessities for the NT based systems.


 
Reply With Quote
 
 
 
 
Dan
Guest
Posts: n/a

 
      18-05-2010, 04:04 PM
"PA Bear [MS MVP]" wrote:

> If you access your account's POP3 and SMTP servers via SSL in OE (or OL),
> your computer is not subject to this vulnerability.
> --
> ~Robear Dyer (PA Bear)
> MS MVP-IE, Mail, Security, Windows Client - since 2002
>
>
> MEB wrote:
> > The exploit vector apparently uses inetcomm.dll vulnerabilities. Other
> > vulnerabilities [per previous/other] include various other base files.
> >
> > Examples of how this vulnerability might work or could affect your
> > usage would include entering/accessing a site which opens the affected
> > applications via server code or page inclusion, connecting to a forum or
> > news server via email or NNTP, and similar situations wherein OE, WM,
> > WLM, might be used or called.
> >
> > Present:
> >
> > Microsoft Security Bulletin MS10-030 - Critical
> > Vulnerability in Outlook Express and Windows Mail Could Allow Remote
> > Code Execution (978542)
> > http://www.microsoft.com/technet/sec.../MS10-030.mspx
> >
> > MS10-030: Vulnerability in Outlook Express and Windows Mail could allow
> > remote code execution
> > http://support.microsoft.com/?kbid=978542
> >
> >
> > Win9X:
> >
> > This issue comes to Win9X for a very simple reason, the base OE [and
> > IE] files left/used may contain a [actually several] severe
> > vulnerability{ies} which could allow the system to be taken over or
> > otherwise hacked. Of course the updates offered are not compiled for use
> > within Win9X since it is EOL/EOS.
> >
> > Any Win9X users that still use OE should review the prior issues and
> > this present vulnerability, particularly as there is no necessity for
> > elevation of privileges, or creation of new accounts. Any offered "proof
> > of concept" exploits would/are designed for usage in systems which would
> > require that activity [NTs] hence would likely fail in Win9X. That does
> > not mean this might not still be accomplished without using the extra
> > necessities for the NT based systems.

>
> .

Thanks for the posting MEB and thanks especially to Robear for the solution.
 
Reply With Quote
 
mactilden mactilden is offline
Junior Member
Join Date: Dec 2010
Posts: 5

 
      22-12-2010, 10:35 AM
In all these there are several things can be possible That does
not mean this might not still be accomplished without using the extra
necessities for the NT based systems.
 
Reply With Quote
 
 
 
Reply

Thread Tools
Display Modes

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off

Forum Jump

Similar Threads
Thread Thread Starter Forum Replies Last Post
Microsoft Outlook Express NNTP Response Parsing Buffer Overflow Vulnerability imhotep Computer Security 0 23-06-2006 03:44 AM
Microsoft Outlook Express NNTP Response Parsing Buffer Overflow Vulnerability imhotep Security Software 0 23-06-2006 03:44 AM
exploit for outlook/outlook express surfaces.. Imhotep Security Software 0 25-06-2005 05:19 AM
Outlook Express/Outlook Preview Panel Norman Virus Information 6 29-09-2004 09:16 PM
Critical Update for Outlook Express Edward Security Software 2 25-06-2004 02:10 PM


All times are GMT. The time now is 01:48 AM.