CVE-2004-0380

Current Description

The MHTML protocol handler in Microsoft Outlook Express 5.5 SP2 through Outlook Express 6 SP1 allows remote attackers to bypass domain restrictions and execute arbitrary code, as demonstrated on Internet Explorer using script in a compiled help (CHM) file that references the InfoTech Storage (ITS) protocol handlers such as (1) ms-its, (2) ms-itss, (3) its, or (4) mk:@MSITStore, aka the "MHTML URL Processing Vulnerability."

Basic Data

PublishedMay 04, 2004
Last ModifiedOctober 12, 2018
Assignercve@mitre.org
Data TypeCVE
Data FormatMITRE
Data Version4.0
Problem TypeNVD-CWE-Other
CVE Data Version4.0

Base Metric V2

CVSS 2 - Version2.0
CVSS 2 - Vector StringAV:N/AC:L/Au:N/C:C/I:C/A:C
CVSS 2 - Access VectorNETWORK
CVSS 2 - Access ComplexityLOW
CVSS 2 - AuthenticationNONE
CVSS 2 - Confidentiality ImpactCOMPLETE
CVSS 2 - Availability ImpactCOMPLETE
CVSS 2 - Base Score10.0
SeverityHIGH
Exploitability Score10.0
Impact Score10.0
Obtain All Privilegetrue
Obtain User Privilegefalse
Obtain Other Privilegefalse

Base Metric V3

No data provided.

Configurations

  • OR - Configuration 1
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3ApplicationMicrosoftOutlook Express5.5*******
    2.3ApplicationMicrosoftOutlook Express6.0*******

Vulnerable Software List

VendorProductVersions
Microsoft Outlook Express 5.5, 6.0

References

NameSourceURLTags
10523http://secunia.com/advisories/10523SECUNIA
VU#323070http://www.kb.cert.org/vuls/id/323070CERT-VNUS Government Resource
http://www.k-otik.net/bugtraq/02.18.InternetExplorer.phphttp://www.k-otik.net/bugtraq/02.18.InternetExplorer.phpMISC
20040219 Microsoft Internet Explorer Unspecified CHM File Processing Arbitrary Code Execution Vulnerability (bid 9658)http://www.securityfocus.com/archive/1/354447BUGTRAQPATCH Vendor Advisory
20040328 IE ms-its: and mk:@MSITStore: vulnerabilityhttp://www.securityfocus.com/archive/1/358913BUGTRAQExploit PATCH Vendor Advisory
9105http://www.securityfocus.com/bid/9105BID
9658http://www.securityfocus.com/bid/9658BID
TA04-104Ahttp://www.us-cert.gov/cas/techalerts/TA04-104A.htmlCERTUS Government Resource
MS04-013https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-013MS
outlook-mhtml-execute-code(15705)https://exchange.xforce.ibmcloud.com/vulnerabilities/15705XF
oval:org.mitre.oval:def:1010https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1010OVAL
oval:org.mitre.oval:def:1028https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1028OVAL
oval:org.mitre.oval:def:882https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A882OVAL
oval:org.mitre.oval:def:990https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A990OVAL