{"vuid":"VU#617436","idnumber":"617436","name":"Microsoft Outlook vulnerable to DoS via a malformed email message","keywords":["Microsoft","Outlook","DoS","denial of service","malformed email message","ms07-jan"],"overview":"There is a vulnerability in the way Microsoft Outlook handles malformed email messages that may allow a remote, unauthenticated attacker to cause a denial of service.","clean_desc":"Microsoft Outlook contains a vulnerability in the way that it handles certain email message headers. According to Microsoft Security Bulletin MS07-003: An attacker who successfully exploited the vulnerability could send a malformed e-mail to a user of Outlook that would cause the Outlook client to fail under certain circumstances. The Outlook client would continue to fail so long as the malformed e-mail message remained on the e-mail server. The e-mail message could be deleted by an e-mail administrator, or by the user via another e-mail client such as Outlook Web Access or Outlook Express, after which point the Outlook client would again function normally. This vulnerability affects Microsoft Outlook 2000, Outlook 2002, and Outlook 2003.","impact":"A remote, unauthenticated attacker may be able to cause a denial of service.","resolution":"Apply Update\nMicrosoft has issued an update to address this issue. See Microsoft Security Bulletin MS07-003. Note that Microsoft has documented known issues that occur after applying this update. See Microsoft Knowledgebase article 925938 for details.","workarounds":"","sysaffected":"","thanks":"This issue is addressed in Microsoft Security Bulletin \nMS07-003","author":"This document was written by Chris Taschner.","public":["http://www.microsoft.com/technet/security/Bulletin/MS07-003.mspx","http://support.microsoft.com/kb/925542/","http://support.microsoft.com/kb/931270/","http://support.microsoft.com/kb/925938","http://secunia.com/advisories/23674/","http://securitytracker.com/alerts/2007/Jan/1017488.html","http://www.securityfocus.com/bid/21937"],"cveids":["CVE-2006-1305"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2007-01-09T18:35:24Z","publicdate":"2007-01-09T00:00:00Z","datefirstpublished":"2007-01-12T16:14:09Z","dateupdated":"2007-01-26T13:47:15Z","revision":28,"vrda_d1_directreport":"0","vrda_d1_population":"3","vrda_d1_impact":"3","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"5","cam_population":"13","cam_impact":"3","cam_easeofexploitation":"14","cam_attackeraccessrequired":"20","cam_scorecurrent":"4.095","cam_scorecurrentwidelyknown":"5.11875","cam_scorecurrentwidelyknownexploited":"9.21375","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":4.095,"vulnote":null}