<!DOCTYPE vdbentry SYSTEM "vulner.dtd">
<vdbentry refer="V-NUMBER">
<title>
Outlook Cache Bypass
</title>
<desc>
<short>
SHORT
</short>
<long>
If Outlook or Outlook Express interpret
an HTML mail message page that creates a second page on ithe same system,
that second page can be created either in the browser's cache or on disk.
When the file is created, if it is created
in the cache, it is in the Internet Zone and
is constrained by those policy settings. But if it is created on disk,
the disk file falls into the Local Intranet Zone (Local Computer Zone)
and is constrained by those policy settings.
In particular, the Internet Zone by default prevents anything executing
in it from accessing local system files except for those in the cache.
The Local Intranet Zone (Local Computer Zone) does not restrict this.
</long>
<comp>
Inetcomm.dll;
Msoe.dll;
Msoert2.dll;
Microsoft Outlook Express 4.0, 4.01, 5.0, 5.01;
Microsoft Outlook 98, 2000;
Not vulnerable:
Outlook Express 5.5
</comp>
<os>
Windows NT 4.0, 95, 98, 2000
</os>
<veffect aswho="user" cando="read">
The attacker creates a Trojan horse that,
when triggered, lets the attacker read files
on the user's system.
</veffect>
<vdetect>
DETECTION
</vdetect>
<vfix>
<tech>
Install the patch
<step>
Be sure you are running Internet Explorer 4.01 SP2 or Internet Explorer 5.01
or later. The patch requires this to install.
<step>
Download the patch for your version of
<href url="http://www.microsoft.com/windows/ie/download/critical/patch9.htm">Outlook or Outlook Express&lkt;href>
and install it.
<
If you are using any system other than Windows 2000,
install Internet Explorer 5.
01 SP1 or Internet Explorer 5.5. This eliminates
the vulnerability.
<tech>
If you are using Windows 2000, install Windows 2000 SP1.
</vfix>
<vother>
OTHER
</vother>
</desc>
<keyword>
KEYWORDS
</keyword>
<cat>
<pa>
PROGRAM ANALYSIS
</pa>
<risos>
RISOS
</risos>
<cve>
<cvenum refer="CVE NUMBER">
CVE DESCRIPTION
</cvenum>
</cat>
<exploit>
EXPLOIT GENERAL INFORMATION
<attack>
POINTERS TO ATTACKS
</attack>
</exploit>
<relinfo>
Microsoft Knowledge Base article
<href url="http://www.microsoft.com/technet/support/kb.asp?ID=247638">Q247638,
Cache Bypass Vulnerability Fix Available</href>
<adv>
<ul>
<li>Microsoft Security Bulletin
<href url="http://www.microsoft.com/technet/security/bulletin/MS00-046.asp">MS00-046<href>
&/ul>
</adv>
<ovn>
OTHER DOVES ENTRIES
</ovn>
</relinfo>
<history>
<report>
<reporter>
WHO
</reporter>
<where>
WHERE
</where>
<when>
WHEN
</when>
<what>
WHAT
</report>
</history>
<revision revno=REVISION_NUMBER>
<changes m=MONTH d=DAY y=YEAR who=YOUR_NAME_HERE>
WHAT YOU DID
</changes>
</revision>
</vdbentry>