{"vuid":"VU#271860","idnumber":"271860","name":"Microsoft Outlook fails to properly parse Office Saved Searches (.oss) files","keywords":["Microsoft","Outlook","remote code execution",".oss file","ms07-jan"],"overview":"A vulnerability exists in the way Microsoft Outlook handles Office Saved Searches (.oss). This vulnerability may allow a remote attacker to execute arbitrary code.","clean_desc":"Office Saved Searches (.oss) contain views of e-mail items that satisfy previous search criteria. Microsoft Outlook fails to properly parse Office Saved Searches (.oss) files. This vulnerability can be triggered when a user opens a specially crafted .oss file. Exploitation of this vulnerability may corrupt system memory, possibly resulting in the exploitation of arbitrary code. More information and a list of affected versions is available in Microsoft Security Bulletin MS07-003.","impact":"A remote, unauthenticated attacker may be able to execute arbitrary code with the permissions of the user running Outlook.","resolution":"Apply an Update Microsoft has released updates in Microsoft Security Bulletin MS07-003 to address this issue. Note:  Applying this patch removes the ability to save and open Office Saved Searches. Please see the Microsoft document entitled \"Cannot open or save Office Saved Searches files in Outlook\" (KB925542) for more information. Microsoft has documented known issues that occur after applying this update. See Microsoft Knowledgebase article 925938 for details.","workarounds":"Workarounds Do not open or save Office Saved Searches files from untrusted sources or unexpected trusted sources.","sysaffected":"","thanks":"Microsoft reported this vulnerability in \nMS07-003\n. Microsoft credits Stuart Pearson for reporting this vulnerability.","author":"This document was written by Katie Steiner.","public":["http://www.microsoft.com/technet/security/Bulletin/MS07-003.mspx","http://support.microsoft.com/kb/925542/","http://support.microsoft.com/kb/931270/","http://support.microsoft.com/kb/925938","http://securitytracker.com/alerts/2007/Jan/1017488.html","http://secunia.com/advisories/23674/","http://www.securityfocus.com/bid/21936"],"cveids":["CVE-2007-0034"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2007-01-09T18:38:09Z","publicdate":"2007-01-09T00:00:00Z","datefirstpublished":"2007-01-09T20:27:34Z","dateupdated":"2007-01-26T13:48:27Z","revision":22,"vrda_d1_directreport":"0","vrda_d1_population":"3","vrda_d1_impact":"3","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"12","cam_population":"16","cam_impact":"17","cam_easeofexploitation":"8","cam_attackeraccessrequired":"20","cam_scorecurrent":"22.032","cam_scorecurrentwidelyknown":"26.112","cam_scorecurrentwidelyknownexploited":"42.432","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":22.032,"vulnote":null}