funsec mailing list archives
RE: 2 critical vulns and the clock isticking..[Fwd: [EEYEB-2000801]]
From: "Greg Wroblewski" <Greg.Wroblewski () microsoft com>
Date: Wed, 11 Jan 2006 09:50:13 -0800
For Outlook I'm sure that the answer to the second question is 'no'. For Outlook Express I'm almost sure. Outlook 2003 accepts valid combinations of the following MIME content types: Primary -------- text multipart message image audio video application Secondary ---------- plain html enriched ms-rtf mixed parallel digest related alternative rfc822 partial external-body octet-stream postscript gif jpeg basic mpeg ms-tnef msword wav pkcs7-mime pkcs7-signature x-pkcs7-mime x-pkcs7-signature signed mac-binhex40 x-vcard Greg ------ This posting is provided as is and confers no rights. -----Original Message----- From: funsec-bounces () linuxbox org [mailto:funsec-bounces () linuxbox org] On Behalf Of Richard M. Smith Sent: Tuesday, January 10, 2006 7:11 PM To: funsec () linuxbox org Subject: RE: [funsec] 2 critical vulns and the clock isticking..[Fwd: [EEYEB-2000801]] Thanks for the background. Is there anyway to find out all the flavors of MIME types that Outlook and Outlook Express will accept as email messages? Can everything but plain text and HTML then be turned off in Outlook and Outlook Express? Richard -----Original Message----- From: funsec-bounces () linuxbox org [mailto:funsec-bounces () linuxbox org] On Behalf Of Matthew Murphy Sent: Tuesday, January 10, 2006 7:02 PM To: funsec () linuxbox org Subject: Re: [funsec] 2 critical vulns and the clock is ticking..[Fwd: [EEYEB-2000801]] -----BEGIN PGP SIGNED MESSAGE----- Hash: RIPEMD160 Gadi Evron wrote:
OK, so we have an advisory for this. Fun. Any idea about the NGSsoftware one? Gadi.
It appears that NGSSoftware's report is related to the TNEF functionality that supports embedding COM/OLE/ActiveX objects into RTF e-mail. The MS bulletin states that TNEF files can contain "malicious OLE objects" which I take to mean you can embed items that, when viewing on them is triggered, execute code that may not be safe for a mail-reading environment. Exactly what that has to do with Exchange Server's role in processing routed TNEF-encoded e-mail, I have no idea. TNEF is only used to encode e-mail in Microsoft's proprietary "Rich Text" format, which is a heavily-extended RTF. Due to the information leakage and incompatibility of TNEF with standards-compliant e-mail readers, most servers and most users shouldn't have a need to send or receive RTF e-mail with attached TNEF formatting information. Stripping the relevant MIME type (I believe, application/x-ms-tnef) should be sufficient. It will reduce potentially-nasty RTF-encoded e-mail to standard plain text. - -- "Social Darwinism: Try to make something idiot-proof, nature will provide you with a better idiot." -- Michael Holstein -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.2 (MingW32) iD8DBQFDxErrfp4vUrVETTgRA0KsAJ9db/mSRDl7luRN8QzicoN9JpUlewCfbzPD uPUxmEluYbrlQGVVgxX3nTA= =GunB -----END PGP SIGNATURE----- _______________________________________________ Fun and Misc security discussion for OT posts. https://linuxbox.org/cgi-bin/mailman/listinfo/funsec Note: funsec is a public and open mailing list. _______________________________________________ Fun and Misc security discussion for OT posts. https://linuxbox.org/cgi-bin/mailman/listinfo/funsec Note: funsec is a public and open mailing list.
Current thread:
- RE: 2 critical vulns and the clock isticking..[Fwd: [EEYEB-2000801]] Greg Wroblewski (Jan 11)