Short Name |
SMTP:OUTLOOK:OBJECT-TAG-XML |
---|---|
Severity |
High |
Recommended |
No |
Recommended Action |
Drop |
Category |
SMTP |
Keywords |
MS-Outlook: Object Tag with XML Exploit |
Release Date |
2004/08/25 |
Update Number |
1213 |
Supported Platforms |
idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+ |
This signature detects attempts to exploit a known vulnerability in Microsoft Outlook and Outlook Express. Attackers can embed malicious object tags in a script included with an e-mail; due to a known vulnerability in handling object tags with XML data, Outlook and Outlook Express process the script when the e-mail appears in the preview pane (the e-mail does not need to be opened). A successful attack can allow arbitrary code execution with the current user permissions.
Internet Explorer does not properly handle object types, when rendering XML based web sites. This may result in the possibility of the execution of malicious software. The problem occurs when Internet Explorer receives a response from the server when a malicious XML web page containing an embedded object tag is parsed. Successful exploitation of this vulnerability could allow a malicious object to be trusted and as such be installed and executed on the local system. The Mindwarper exploit is actually reported to exploit one of the issues in BID 8577, which has not been addressed by the patches provided in MS03-040.