Cumulative Security Update for Microsoft Outlook Express and Windows Mail (929123)

medium Nessus Network Monitor Plugin ID 4093

Synopsis

The remote host is running a version of Microsoft Outlook Express that contains several security flaws that may allow an attacker to execute arbitrary code on the remote host.

Description

Arbitrary code can be executed on the remote host through the email client. The remote host is running a version of Microsoft Outlook Express that contains several security flaws that may allow an attacker to execute arbitrary code on the remote host. To exploit this flaw, an attacker would need to send a malformed email to a victim on the remote host and have him open it.

Solution

Upgrade or patch according to vendor recommendations.

See Also

http://www.microsoft.com/technet/security/bulletin/ms07-034.mspx

Plugin Details

Severity: Medium

ID: 4093

Family: SMTP Clients

Published: 6/12/2007

Updated: 3/6/2019

Nessus ID: 25487

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: Medium

Base Score: 5.4

Temporal Score: 4.5

Vector: CVSS2#AV:A/AC:M/Au:N/C:P/I:P/A:P

CVSS v3

Risk Factor: Medium

Base Score: 5

Temporal Score: 4.7

Vector: CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:microsoft:outlook_express

Reference Information

CVE: CVE-2006-2111, CVE-2007-1658, CVE-2007-2225, CVE-2007-2227

BID: 24392, 24410, 17717, 23103