lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <4016489C.7761.8B85A576@localhost>
From: nick at virus-l.demon.co.uk (Nick FitzGerald)
Subject: Outlook Express - is this possible?

"Gregh" <chows@...mail.com.au> wrote:

> I may just be confusing myself here so bear with me:
> 
> I believe an exploit cropped up within the last 12 months or so for OE
> (version unknown) where the user has preview pane OFF and receives an email
> that he doesn't actually double click on to open. However, in deleting it,
> the user either web bugs himself or puts some sort of exploit in. I cant
> remember whether I am confusing myself with more than one issue here but can
> anyone help. Did that happen, was it possible at one stage or possible now?
<<snip>>

There was an exploitable buffer overflow in a date handling routine in 
some .DLL (MSHTML.DLL ???) that OE used for its date functions.  IIRC, 
this routine was always called while downloading and parsing messages 
(for indexing purposes?) so you could be DoS'ed (at least, if not 
owned) simply by downloading your mail.

I have a feeling that was closer to two years ago, but have not 
bothered to search the archives to check...


Regards,

Nick FitzGerald


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ