{"vuid":"VU#869640","idnumber":"869640","name":"Microsoft Outlook Express fails to properly validate malformed e-mail headers","keywords":["Microsoft","Outlook Express","malformed","e-mail header","denial of service","DoS","Q823353","MS04-018"],"overview":"A vulnerability exists in some versions of Microsoft Outlook Express that could allow a remote attacker to cause a denial of service.","clean_desc":"According to Microsoft Security Bulletin MS04-018, a flaw exists in the way that some versions of Microsoft's Outlook Express mail client validate message headers. This flaw results in a vulnerability that could cause the Outlook Express program to crash when an email message containing certain malformed headers are received. The specific nature of the malformation is not known at this time. Microsoft's bulletin states that the following versions of Outlook Express are affected by this issue: Microsoft Outlook Express 5.5 Service Pack 2\nMicrosoft Outlook Express 6\nMicrosoft Outlook Express 6 Service Pack 1\nMicrosoft Outlook Express 6 Service Pack 1 (64 bit Edition)\nMicrosoft Outlook Express 6 on Windows Server 2003\nMicrosoft Outlook Express 6 on Windows Server 2003 (64 bit edition)","impact":"An attacker with the ability to craft and deliver a specially-formed email message could cause the Outlook Express program on the recipient's computer to crash.","resolution":"Apply a patch from the vendor Microsoft has released patches to address this issue. Please see the Systems Affected section of this document for more information.","workarounds":"Workarounds Microsoft lists the following partial workaround for this vulnerability: Disable the preview pane Disabling the preview pane will prevent the malicious e-mail message from causing Outlook Express to fail on each restart. To disable the preview pane, follow these steps: 1. In Outlook Express, click View, and then click Layout. 2. Click to clear the Show Preview Pane check box, and then click OK. Note that this workaround will not mitigate the vulnerability, but will prevent the malicious e-mail message from causing Outlook Express to fail on each restart.","sysaffected":"","thanks":"Thanks to \nMicrosoft Security\n for reporting this vulnerability.","author":"This document was written by Chad R Dougherty based upon information provided in Microsoft Security Bulletin MS04-018.","public":["h","t","t","p",":","/","/","w","w","w",".","m","i","c","r","o","s","o","f","t",".","c","o","m","/","t","e","c","h","n","e","t","/","s","e","c","u","r","i","t","y","/","b","u","l","l","e","t","i","n","/","M","S","0","4","-","0","1","8",".","m","s","p","x"],"cveids":["CVE-2004-0215"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2004-07-13T20:19:57Z","publicdate":"2004-07-13T00:00:00Z","datefirstpublished":"2004-07-14T14:38:38Z","dateupdated":"2004-07-23T18:52:41Z","revision":17,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"4","cam_population":"15","cam_impact":"7","cam_easeofexploitation":"10","cam_attackeraccessrequired":"20","cam_scorecurrent":"7.48125","cam_scorecurrentwidelyknown":"9.45","cam_scorecurrentwidelyknownexploited":"17.325","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":7.48125,"vulnote":null}