Exploit Microsoft Outlook Express 5/6 - Spoofable File Extensions

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
21631
Проверка EDB
  1. Пройдено
Автор
MATTHEW MURPHY
Тип уязвимости
REMOTE
Платформа
WINDOWS
CVE
null
Дата публикации
2002-07-20
Код:
source: https://www.securityfocus.com/bid/5277/info

It is possible for a malicious user, sending email via a mail agent capable of manipulating the MIME headers, to spoof file extensions for users of Outlook Express. For example, an .exe file can be made to look like a .txt (or other seemingly harmless file type) file in the attachment list.

When including a certain string of characters between the filename and the actual file extension, Outlook Express will display the specified misleading file extension type. 

The end result is that an attacker is able to entice a user to open or save files of arbitrary types to their local system.

https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/21631.eml
 
Источник
www.exploit-db.com

Похожие темы