Vulnerability CVE-2008-3068


Published: 2008-07-07   Modified: 2012-02-12

Description:
Microsoft Crypto API 5.131.2600.2180 through 6.0, as used in Outlook, Windows Live Mail, and Office 2007, performs Certificate Revocation List (CRL) checks by using an arbitrary URL from a certificate embedded in a (1) S/MIME e-mail message or (2) signed document, which allows remote attackers to obtain reading times and IP addresses of recipients, and port-scan results, via a crafted certificate with an Authority Information Access (AIA) extension.

See advisories in our WLB2 database:
Topic
Author
Date
High
Unauthorized reading confirmation from Outlook
Augusto Paes de ...
07.07.2008
Med.
Microsoft CryptoAPI / Outlook 2007-2013 Design Bug
n.runs
13.11.2013

Type:

CWE-Other

Vendor: Microsoft
Product: Windows live mail 
Version: 2008;
Product: Access 
Version: 2007;
Product: Publisher 
Version: 2007; 2003;
Product: Office 
Version: 2007;
Product: Excel 
Version: 2007; 2003;
Product: Visio professional 
Version: 2007;
Product: Project professional 
Version: 2007;
Product: Groove 
Version: 2007;
Product: Outlook 
Version: 2007; 2003;
Product: Infopath 
Version: 2007; 2003;
Product: Sharepoint designer 
Version: 2007;
Product: Powerpoint 
Version: 2007; 2003;
Product: Office communicator 
Version: 2007;
Product: Visio standard 
Version: 2007;
Product: Project standard 
Version: 2007;
Product: Onenote 
Version: 2003;
Product: Frontpage 
Version: 2003;

CVSS2 => (AV:N/AC:L/Au:N/C:P/I:P/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
7.5/10
6.4/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
Partial
Partial

 References:
http://securityreason.com/securityalert/3978
http://www.securityfocus.com/archive/1/493947/100/0/threaded
http://www.securityfocus.com/archive/1/494101/100/0/threaded
http://www.securityfocus.com/bid/28548
http://www.securitytracker.com/id?1019736
http://www.securitytracker.com/id?1019737
http://www.securitytracker.com/id?1019738
https://www.cynops.de/advisories/AKLINK-SA-2008-002.txt
https://www.cynops.de/advisories/AKLINK-SA-2008-003.txt
https://www.cynops.de/advisories/AKLINK-SA-2008-004.txt
https://www.cynops.de/techzone/http_over_x509.html

Related CVE
CVE-2019-0647
An information disclosure vulnerability exists when Team Foundation Server does not properly handle variables marked as secret, aka "Team Foundation Server Information Disclosure Vulnerability." This affects Team.
CVE-2019-0646
A Cross-site Scripting (XSS) vulnerability exists when Team Foundation Server does not properly sanitize user provided input, aka "Team Foundation Server Cross-site Scripting Vulnerability." This affects Team.
CVE-2019-0624
A spoofing vulnerability exists when a Skype for Business 2015 server does not properly sanitize a specially crafted request, aka "Skype for Business 2015 Spoofing Vulnerability." This affects Skype.
CVE-2019-0622
An elevation of privilege vulnerability exists when Skype for Andriod fails to properly handle specific authentication requests, aka "Skype for Android Elevation of Privilege Vulnerability." This affects Skype 8.35.
CVE-2019-0588
An information disclosure vulnerability exists when the Microsoft Exchange PowerShell API grants calendar contributors more view permissions than intended, aka "Microsoft Exchange Information Disclosure Vulnerability." This affects Microsoft Exchange...
CVE-2019-0586
A remote code execution vulnerability exists in Microsoft Exchange software when the software fails to properly handle objects in memory, aka "Microsoft Exchange Memory Corruption Vulnerability." This affects Microsoft Exchange Server.
CVE-2019-0585
A remote code execution vulnerability exists in Microsoft Word software when it fails to properly handle objects in memory, aka "Microsoft Word Remote Code Execution Vulnerability." This affects Word, Microsoft Office, Microsoft Office Word Viewer, O...
CVE-2019-0584
A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory, aka "Jet Database Engine Remote Code Execution Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Win...

Copyright 2019, cxsecurity.com

 

Back to Top