First published: Wed Aug 13 2008(Updated: )
The MHTML protocol handler in a component of Microsoft Outlook Express 5.5 SP2 and 6 through SP1, and Windows Mail, does not assign the correct Internet Explorer Security Zone to UNC share pathnames, which allows remote attackers to bypass intended access restrictions and read arbitrary files via an mhtml: URI in conjunction with a redirection, aka "URL Parsing Cross-Domain Information Disclosure Vulnerability."
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Outlook Express | =5.5-sp2 | |
Microsoft Outlook Express | =6.0 | |
Microsoft Outlook Express | =6.0-sp1 | |
Microsoft Outlook.com |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-1448 has a medium severity rating as it allows remote attackers to read arbitrary files.
To fix CVE-2008-1448, ensure that you are using an updated version of Microsoft Outlook Express or Windows Mail.
CVE-2008-1448 affects Microsoft Outlook Express versions 5.5 SP2, 6 SP1, and Windows Mail.
Yes, CVE-2008-1448 can allow attackers to bypass access restrictions on UNC share pathnames.
A temporary workaround for CVE-2008-1448 may include restricting the use of UNC paths within the affected software.