[Esd-l] Outlook 2003 exploit using active scripting.
John D. Hardin
jhardin at impsec.org
Fri May 21 06:08:43 PDT 2004
On Wed, 19 May 2004, Joe Steele wrote:
> I haven't studied the sample message (I didn't want to open it in
> Outlook, and I'm not sure how to open it otherwise), but I suspect
> that it sends itself as an "application/ms-tnef" MIME type (based
> on a little experimenting with embedding objects in a RTF Outlook
> message). If this is indeed true, then defining
> "SECURITY_STRIP_MSTNEF" should be sufficient protection. Would
> anyone care to confirm that this is how the sample message sends
> itself?
I've been in touch with the guy who announced the vulnerability. This
does appear to be the attack vector. $SECURITY_STRIP_MSTNEF is the
defense.
--
John Hardin KA7OHZ ICQ#15735746 http://www.impsec.org/~jhardin/
jhardin at impsec.org FALaholic #11174 pgpk -a jhardin at impsec.org
key: 0xB8732E79 - 2D8C 34F4 6411 F507 136C AF76 D822 E6E6 B873 2E79
-----------------------------------------------------------------------
Bush? Kerry? I'm so sick of our elections always being "choose the
lesser of two evils."
-----------------------------------------------------------------------
165 days until the Presidential Election
More information about the esd-l
mailing list