漏洞信息详情
Microsoft Outlook Mailto参数引用域绕过漏洞(MS04-009)
- CNNVD编号:CNNVD-200404-053
- 危害等级: 高危
- CVE编号:
CVE-2004-0121
- 漏洞类型:
设计错误
- 发布时间:
2004-03-09
- 威胁类型:
远程
- 更新时间:
2005-05-18
- 厂 商:
microsoft - 漏洞来源:
Jouko Pynn?nen.※ j… -
漏洞简介
Microsoft Outlook是流行的邮件客户端。
Microsoft Outlook在处理mailto URL参数时存在问题,远程攻击者可以利用这个漏洞使IE在本地电脑域中执行任意脚本代码。
Microsoft Outlook是一个集中EMAIL消息,联系人,提醒服务等应用程序的系统。在outlook安装时,mailto: URL处理器会注册在系统中,当 mailto: URL打开时,系统就以下面参数启动OUTLOOK.EXE:
OUTLOOK.EXE -c IPM.Note /m \”mailto:email@address\”
如果URL包含引用符号,额外的命令行参数就可以注入到OUTLOOK.EXE中,而且由Outlook打开的启动URL也可以由命令行提供,这个URL可以是一个javascript: URL,如果在outtlook中\”Outlook today\”页当前被查看,脚本代码将以本地电脑安全域上下文执行,这可导致攻击者下载和启动一个恶意程序。
攻击者可以利用恶意WEB页和HTML形式EMAIL来触发此漏洞。
如果\”Outlook today\”功能在outlook中不是默认查看器,攻击者可以通过使用两个mailto: URLs来触发,如第一个mailto: URL启动OUTLOOK.EXE和使其使用\”Outlook today\”,然后提供另一个mailto: URL来启动恶意脚本。
漏洞公告
厂商补丁:
Microsoft
———
Microsoft已经为此发布了一个安全公告(MS04-009)以及相应补丁:
MS04-009:Vulnerability in Microsoft Outlook Could Allow Code Execution (828040)
链接:http://www.microsoft.com/technet/security/bulletin/ms04-009.mspx” target=”_blank”>
http://www.microsoft.com/technet/security/bulletin/ms04-009.mspx
补丁下载:
Microsoft Office XP SP2:
Microsoft Patch MS04-009 Office XP SP2 Update
http://www.microsoft.com/downloads/details.aspx?FamilyId=52F1A951-24DB-44A5-9475-EA5D302BCA6A&displaylang=en” target=”_blank”>
http://www.microsoft.com/downloads/details.aspx?FamilyId=52F1A951-24DB-44A5-9475-EA5D302BCA6A&displaylang=en
Microsoft Upgrade Office XP Service Pack 3
http://www.microsoft.com/downloads/details.aspx?FamilyId=85AF7BFD-6F69-4289-8BD1-EB966BCDFB5E&displaylang=en” target=”_blank”>
http://www.microsoft.com/downloads/details.aspx?FamilyId=85AF7BFD-6F69-4289-8BD1-EB966BCDFB5E&displaylang=en
Microsoft Outlook 2002 SP2:
Microsoft Patch MS04-009 Outlook SP2 Update
http://www.microsoft.com/downloads/details.aspx?FamilyId=52F1A951-24DB-44A5-9475-EA5D302BCA6A&displaylang=en” target=”_blank”>
http://www.microsoft.com/downloads/details.aspx?FamilyId=52F1A951-24DB-44A5-9475-EA5D302BCA6A&displaylang=en
Microsoft Upgrade Outlook 2002 Service Pack 3
http://www.microsoft.com/downloads/details.aspx?FamilyId=85AF7BFD-6F69-4289-8BD1-EB966BCDFB5E&displaylang=en” target=”_blank”>
http://www.microsoft.com/downloads/details.aspx?FamilyId=85AF7BFD-6F69-4289-8BD1-EB966BCDFB5E&displaylang=en
Microsoft Office XP SP1:
Microsoft Upgrade Office XP Service Pack 3
http://www.microsoft.com/downloads/details.aspx?FamilyId=85AF7BFD-6F69-4289-8BD1-EB966BCDFB5E&displaylang=en” target=”_blank”>
http://www.microsoft.com/downloads/details.aspx?FamilyId=85AF7BFD-6F69-4289-8BD1-EB966BCDFB5E&displaylang=en
Microsoft Outlook 2002 SP1:
Microsoft Upgrade Outlook 2002 Service Pack 3
http://www.microsoft.com/downloads/details.aspx?FamilyId=85AF7BFD-6F69-4289-8BD1-EB966BCDFB5E&displaylang=en” target=”_blank”>
http://www.microsoft.com/downloads/details.aspx?FamilyId=85AF7BFD-6F69-4289-8BD1-EB966BCDFB5E&displaylang=en
Microsoft Office XP :
Microsoft Upgrade Office XP Service Pack 3
http://www.microsoft.com/downloads/details.aspx?FamilyId=85AF7BFD-6F69-4289-8BD1-EB966BCDFB5E&displaylang=en” target=”_blank”>
http://www.microsoft.com/downloads/details.aspx?FamilyId=85AF7BFD-6F69-4289-8BD1-EB966BCDFB5E&displaylang=en
Microsoft Outlook 2002 :
Microsoft Upgrade Outlook 2002 Service Pack 3
http://www.microsoft.com/downloads/details.aspx?FamilyId=85AF7BFD-6F69-4289-8BD1-EB966BCDFB5E&displaylang=en” target=”_blank”>
http://www.microsoft.com/downloads/details.aspx?FamilyId=85AF7BFD-6F69-4289-8BD1-EB966BCDFB5E&displaylang=en
参考网址
来源:US-CERT Technical Alert: TA04-070A
名称: TA04-070A
链接:http://www.us-cert.gov/cas/techalerts/TA04-070A.html
来源:US-CERT Vulnerability Note: VU#305206
名称: VU#305206
链接:http://www.kb.cert.org/vuls/id/305206
来源: BID
名称: 9827
链接:http://www.securityfocus.com/bid/9827
来源: MS
名称: MS04-009
链接:http://www.microsoft.com/technet/security/bulletin/ms04-009.asp
来源: IDEFENSE
名称: 20040309 Microsoft Outlook “mailto:” Parameter Passing Vulnerability
链接:http://www.idefense.com/application/poi/display?id=79&type=vulnerabilities
来源: XF
名称: outlook-ms04009-patch(15429)
链接:http://xforce.iss.net/xforce/xfdb/15429
来源: XF
名称: outlook-mailtourl-execute-code(15414)
链接:http://xforce.iss.net/xforce/xfdb/15414
来源: CIAC
名称: O-096
链接:http://www.ciac.org/ciac/bulletins/o-096.shtml
来源: BUGTRAQ
名称: 20040310 Outlook mailto: URL argument injection vulnerability
链接:http://marc.theaimsgroup.com/?l=bugtraq&m=107893704602842&w=2
来源: US Government Resource: oval:org.mitre.oval:def:843
名称: oval:org.mitre.oval:def:843
链接:http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:843