Rechercher
Contactez-nous Suivez-nous sur Twitter En francais English Language
 

Freely subscribe to our NEWSLETTER

Newsletter FR

Newsletter EN

Vulnérabilités

Unsubscribe

Vigil@nce: Microsoft Outlook, denial of service via extension

December 2010 by Vigil@nce

This bulletin was written by Vigil@nce : http://vigilance.fr/

SYNTHESIS OF THE VULNERABILITY

An attacker can send an email with an attachment without an
extension, in order to stop Microsoft Outlook on the recipient’s
computer.

 Severity: 1/4
 Creation date: 29/11/2010

DESCRIPTION OF THE VULNERABILITY

The reading pane of Microsoft Outlook indicates attachments. User
can click on it, in order to access to the attachment.

A filename usually ends with an extension ("name.extension").
Outlook extracts the extension, in order to analyze it. However,
if the extension is missing ("name."), Outlook dereferences a NULL
pointer.

An attacker can therefore send an email with an attachment without
an extension, in order to stop Microsoft Outlook on the
recipient’s computer.

ACCESS TO THE COMPLETE VIGIL@NCE BULLETIN

http://vigilance.fr/vulnerability/Microsoft-Outlook-denial-of-service-via-extension-10160


See previous articles

    

See next articles


Your podcast Here

New, you can have your Podcast here. Contact us for more information ask:
Marc Brami
Phone: +33 1 40 92 05 55
Mail: ipsimp@free.fr

All new podcasts