[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250770

 
 

909

 
 

196157

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2004-0380Date: (C)2004-05-04   (M)2023-12-22


The MHTML protocol handler in Microsoft Outlook Express 5.5 SP2 through Outlook Express 6 SP1 allows remote attackers to bypass domain restrictions and execute arbitrary code, as demonstrated on Internet Explorer using script in a compiled help (CHM) file that references the InfoTech Storage (ITS) protocol handlers such as (1) ms-its, (2) ms-itss, (3) its, or (4) mk:@MSITStore, aka the "MHTML URL Processing Vulnerability."

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 10.0
Exploit Score: 10.0
Impact Score: 10.0
 
CVSS V2 Metrics:
Access Vector: NETWORK
Access Complexity: LOW
Authentication: NONE
Confidentiality: COMPLETE
Integrity: COMPLETE
Availability: COMPLETE
  
Reference:
SECUNIA-10523
http://www.securityfocus.com/archive/1/354447
http://www.securityfocus.com/archive/1/358913
BID-9105
BID-9658
MS04-013
TA04-104A
VU#323070
http://www.k-otik.net/bugtraq/02.18.InternetExplorer.php
outlook-mhtml-execute-code(15705)
oval:org.mitre.oval:def:1010
oval:org.mitre.oval:def:1028
oval:org.mitre.oval:def:882
oval:org.mitre.oval:def:990

CPE    2
cpe:/a:microsoft:outlook_express:5.5
cpe:/a:microsoft:outlook_express:6.0
OVAL    4
oval:org.mitre.oval:def:1010
oval:org.mitre.oval:def:990
oval:org.mitre.oval:def:882
oval:org.mitre.oval:def:1028
...

© SecPod Technologies