New Search

Microsoft Outlook Express v6.0SP1 MHTML URL Processing Vulnerability

oval:org.mitre.oval:def:1010

The MHTML protocol handler in Microsoft Outlook Express 5.5 SP2 through Outlook Express 6 SP1 allows remote attackers to bypass domain restrictions and execute arbitrary code as demonstrated on Internet Explorer using script in a compiled help (CHM) file that references the InfoTech Storage (ITS) protocol handlers such as (1) ms-its (2) ms-itss (3) its or (4) mk:@MSITStore aka the "MHTML URL Processing Vulnerability."

Family:
windows
Status:
ACCEPTED
Platform(s):
  • Microsoft Windows XP
  • Microsoft Windows NT
  • Microsoft Windows 2000
  • Microsoft Windows ME
  • Microsoft Windows 98
Class:
vulnerability
Reference(s):
  • CVE-2004-0380
Product(s):
  • Microsoft Outlook Express