Microsoft Outlook Express 6纯文本邮件脚本执行漏洞

漏洞信息详情

Microsoft Outlook Express 6纯文本邮件脚本执行漏洞

漏洞简介

Outlook Express 6.00版本存在漏洞。远程攻击者可以通过向MIME目录类型是text/plain的信息中植入SCRIPT标签执行任意脚本,该漏洞相反于text/plain信息不运行脚本的预期行为。

漏洞公告

Currently the SecurityFocus staff are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com .
@securityfocus.com>

参考网址

来源: XF
名称: outlook-express-text-script-execution(7118)
链接:http://xforce.iss.net/static/7118.php

来源: BID
名称: 3334
链接:http://www.securityfocus.com/bid/3334

来源: BUGTRAQ
名称: 20010915 Proof-Of-Concept Perl Script for Bugtraq-ID: #3334
链接:http://www.securityfocus.com/archive/1/214453

来源: BUGTRAQ
名称: 20010912 FREAK SHOW: Outlook Express 6.00
链接:http://www.securityfocus.com/archive/1/213754

© 版权声明
THE END
喜欢就支持一下吧
点赞0 分享