Microsoft Outlook Rich Text Format Information Disclosure Vulnerability
BID:1631
Info
Microsoft Outlook Rich Text Format Information Disclosure Vulnerability
| Bugtraq ID: | 1631 |
| Class: | Design Error |
| CVE: | |
| Remote: | No |
| Local: | Yes |
| Published: | Aug 24 2000 12:00AM |
| Updated: | Aug 24 2000 12:00AM |
| Credit: | Posted to Bugtraq on August 24, 2000 by Bryce Walter <[email protected]>. This issue was rediscovered by Dmitriy Kropivnitskiy <[email protected]> on Aug 2, 2001. |
| Vulnerable: |
Microsoft Outlook 98 0 Microsoft Outlook 97 0 Microsoft Outlook 2000 0 |
| Not Vulnerable: | |
Discussion
Microsoft Outlook Rich Text Format Information Disclosure Vulnerability
If an email message is sent from a Microsoft Outlook client and is RTF formatted, a file named winmail.dat is also sent as an attachment. If the recipient opens the email message in a client other than Outlook, the windmail.dat file will be visible as an attachment. Windmail.dat contains the full path of the senders' .pst file which is located on the user profile directory by default. The path contains the username of the sender in addition to the domain name.
Reportedly, if the email message is sent through Exchange Server 5.5, windmail.dat will be stripped from the email message and it will not be received by the intended recipient.
If an email message is sent from a Microsoft Outlook client and is RTF formatted, a file named winmail.dat is also sent as an attachment. If the recipient opens the email message in a client other than Outlook, the windmail.dat file will be visible as an attachment. Windmail.dat contains the full path of the senders' .pst file which is located on the user profile directory by default. The path contains the username of the sender in addition to the domain name.
Reportedly, if the email message is sent through Exchange Server 5.5, windmail.dat will be stripped from the email message and it will not be received by the intended recipient.
Exploit / POC
Microsoft Outlook Rich Text Format Information Disclosure Vulnerability
No exploit code is necessary for this vulnerability.
No exploit code is necessary for this vulnerability.
Solution / Fix
Microsoft Outlook Rich Text Format Information Disclosure Vulnerability
Solution:
Currently the SecurityFocus staff are not aware of any vendor supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: [email protected].
Solution:
Currently the SecurityFocus staff are not aware of any vendor supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: [email protected].
References
Microsoft Outlook Rich Text Format Information Disclosure Vulnerability
References:
References:
- Microsoft Technet Security (Microsoft)