Microsoft Outlook Express and Windows Mail NNTP Response Command Execution
Publish Date: 15 février 2011
Gravité: : Critique
Identifiant(s) CVE: : CVE-2007-3897,MS07-056
Date du conseil: 15 février 2011
Description
Heap-based buffer overflow in Microsoft Outlook Express 6 and earlier, and Windows Mail for Vista, allows remote Network News Transfer Protocol (NNTP) servers to execute arbitrary code via long NNTP responses that trigger memory corruption.
Information Exposure Rating:
Trend Micro Deep Security shields networks through Deep Packet Inspection (DPI) rules. Trend Micro customers using OfficeScan with Intrusion Defense Firewall (IDF) plugin are also protected from attacks using these vulnerabilities. Please refer to the filter number and filter name when applying appropriate DPI and/or IDF rules.
Solutions
Trend Micro Deep Security DPI Rule Number: 1001130
Trend Micro Deep Security DPI Rule Name: 1001130 - Microsoft Outlook Express and Windows Mail NNTP Response Command Execution
Affected software and version:
- Microsoft Outlook Express 6.0
- Microsoft Outlook Express 6.0 SP1
- Microsoft Windows Mail unversioned