CVE-2004-0121

Current Description

Argument injection vulnerability in Microsoft Outlook 2002 does not sufficiently filter parameters of mailto: URLs when using them as arguments when calling OUTLOOK.EXE, which allows remote attackers to use script code in the Local Machine zone and execute arbitrary programs.

Referenced by CVEs:CVE-2017-5078

Basic Data

PublishedApril 15, 2004
Last ModifiedOctober 12, 2018
Assignercve@mitre.org
Data TypeCVE
Data FormatMITRE
Data Version4.0
Problem TypeNVD-CWE-Other
CVE Data Version4.0

Base Metric V2

CVSS 2 - Version2.0
CVSS 2 - Vector StringAV:N/AC:L/Au:N/C:P/I:P/A:P
CVSS 2 - Access VectorNETWORK
CVSS 2 - Access ComplexityLOW
CVSS 2 - AuthenticationNONE
CVSS 2 - Confidentiality ImpactPARTIAL
CVSS 2 - Availability ImpactPARTIAL
CVSS 2 - Base Score7.5
SeverityHIGH
Exploitability Score10.0
Impact Score6.4
Obtain All Privilegefalse
Obtain User Privilegefalse
Obtain Other Privilegetrue

Base Metric V3

No data provided.

Configurations

  • OR - Configuration 1
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3ApplicationMicrosoftOfficexp*******
    2.3ApplicationMicrosoftOfficexpsp1******
    2.3ApplicationMicrosoftOfficexpsp2******
    2.3ApplicationMicrosoftOutlook2002*******
    2.3ApplicationMicrosoftOutlook2002sp1******
    2.3ApplicationMicrosoftOutlook2002sp2******

Vulnerable Software List

VendorProductVersions
Microsoft Office xp
Microsoft Outlook 2002

References

NameSourceURLTags
20040310 Outlook mailto: URL argument injection vulnerabilityhttp://marc.info/?l=bugtraq&m=107893704602842&w=2BUGTRAQ
O-096http://www.ciac.org/ciac/bulletins/o-096.shtmlCIAC
20040309 Microsoft Outlook "mailto:" Parameter Passing Vulnerabilityhttp://www.idefense.com/application/poi/display?id=79&type=vulnerabilitiesIDEFENSEPATCH Vendor Advisory
VU#305206http://www.kb.cert.org/vuls/id/305206CERT-VNUS Government Resource
9827http://www.securityfocus.com/bid/9827BIDExploit PATCH Vendor Advisory
TA04-070Ahttp://www.us-cert.gov/cas/techalerts/TA04-070A.htmlCERTUS Government Resource
MS04-009https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-009MS
outlook-mailtourl-execute-code(15414)https://exchange.xforce.ibmcloud.com/vulnerabilities/15414XF
outlook-ms04009-patch(15429)https://exchange.xforce.ibmcloud.com/vulnerabilities/15429XF
oval:org.mitre.oval:def:843https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A843OVAL