This vulnerability allows remote attackers to disclose sensitive information on affected installations of Microsoft Outlook. User interaction is required to exploit this vulnerability in that the target must open a malicious email or view it in the preview pane. The specific flaw exists within the parsing of HTML content in email. A crafted email can trigger a read before the start of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of the current process.
Affected Software | Affected Version | How to fix |
---|---|---|
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of ZDI-CAN-11250 is considered critical due to its potential for remote information disclosure.
ZDI-CAN-11250 allows remote attackers to disclose sensitive information by exploiting a vulnerability in Microsoft Outlook.
Exploitation of ZDI-CAN-11250 requires user interaction, as the victim must open a malicious email or view it in the preview pane.
To mitigate the risks with ZDI-CAN-11250, users should avoid opening suspicious emails and ensure Outlook is kept up to date with security patches.
Yes, Microsoft has released patches to address the vulnerabilities associated with ZDI-CAN-11250.