Outlook Express .wab File Processing Overflow

medium Nessus Network Monitor Plugin ID 3510

Synopsis

The remote host is vulnerable to a buffer overflow.

Description

The remote client is running Microsoft Outlook Express. The noted version of Outlook Express is vulnerable to a buffer overflow in the way that it handles the parsing of .wab files. An attacker exploiting this flaw would need to be able to entice the user into opening the attachment. Successful exploitation would result in code being executed with the rights of the compromised user.

Solution

Upgrade or patch according to vendor recommendations.

See Also

http://www.microsoft.com/technet/security/Bulletin/MS06-016.mspx

Plugin Details

Severity: Medium

ID: 3510

Family: SMTP Clients

Published: 8/18/2004

Updated: 3/6/2019

Risk Information

VPR

Risk Factor: Medium

Score: 5.3

CVSS v2

Risk Factor: Medium

Base Score: 5.1

Temporal Score: 3.8

Vector: CVSS2#AV:N/AC:H/Au:N/C:P/I:P/A:P

CVSS v3

Risk Factor: Medium

Base Score: 5.6

Temporal Score: 4.9

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:microsoft:outlook_express

Reference Information

CVE: CVE-2006-0014

BID: 17459