header-logo
Suggest Exploit
vendor:
Outlook Express
by:
SecurityFocus
7.5
CVSS
HIGH
Bypass Vulnerability
264
CWE
Product Name: Outlook Express
Affected Version From: Microsoft Outlook Express 6
Affected Version To: Microsoft Outlook Express 6
Patch Exists: NO
Related CWE: N/A
CPE: a:microsoft:outlook_express:6.0
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: Windows
2002

Microsoft Outlook Express 6 Dangerous File Attachment Type Security Feature Bypass Vulnerability

Microsoft Outlook Express 6 contains a new security feature which prevents users from opening potentially harmful file attachments. A vulnerability exists which allows a file embedded within an HTML frame in an email message to bypass the dangerous file attachment type security feature. When a message containing an attachment embedded in this way is opened or previewed, the user is automatically prompted to open or save the attachment. If the user attempts to open the file immediately, the action will fail. However, an assembler coded .exe attachment which has had it's extension changed to .bat will execute immediately. Regardless of the extension type, the user is able to save the attachment to disk.

Mitigation:

Users should be aware of the potential for malicious attachments to be sent in HTML frames and should not open any attachments from untrusted sources.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/3271/info

Microsoft Outlook Express 6 contains a new security feature which prevents users from opening potentially harmful file attachments.

A vulnerability exists which allows a file embedded within an HTML frame in an email message to bypass the dangerous file attachment type security feature. When a message containing an attachment embedded in this way is opened or previewed, the user is automatically prompted to open or save the attachment.

If the user attempts to open the file immediately, the action will fail. However, an assembler coded .exe attachment which has had it's extension changed to .bat will execute immediately. Regardless of the extension type, the user is able to save the attachment to disk. 

https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/21096.zip