The Active Network
ActiveMac Anonymous | Create a User | Reviews | News | Forums | Advertise  
 

  *  

  Microsoft Security Bulletin MS01-057: Specially Formed Script in HMTL Mail can Execute in Exchange 5.5 OWA
Time: 18:57 EST/23:57 GMT | News Source: Microsoft TechNet Security | Posted By: Matthew Sabean

Outlook Web Access (OWA) is a service of Exchange 5.5 Server that allows users to access and manipulate messages in their Exchange mailbox by using a web browser. A flaw exists in the way OWA handles inline script in messages in conjunction with Internet Explorer (IE). If an HTML message that contains specially formatted script is opened in OWA, the script executes when the message is opened. Because OWA requires that scripting be enabled in the zone where the OWA server is located, a vulnerability results because this script could take any action against the user's Exchange mailbox that the user himself was capable of, including sending, moving, or deleting messages. An attacker could maliciously exploit this flaw by sending a specially crafted message to the user. If the user opened the message in OWA, the script would then execute. While it is possible for a script to send a message as the user, it is impossible for the script to send a message to addresses in the user's address book. Thus, the flaw cannot be exploited for mass-mailing attacks. Also, mounting a successful attack requires knowledge of the intended victim's choice of mail clients and reading habits. If the maliciously crafted message were read in any mail client other than a browser through OWA, the attack would fail.

Download locations for this patch:
Microsoft Exchange 5.5: http://www.microsoft.com/Downloads/Release.asp?ReleaseID=34402

Write Comment
Return to News

  Displaying 776 through 779 of 779
Prev | First
  The time now is 1:53:25 AM ET.
Any comment problems? E-mail us
#776 By 4240821 (82.115.4.100) at 1/7/2026 9:16:14 PM
https://www.pillowfort.social/posts/6858011
https://www.pillowfort.social/posts/6857908
https://www.pillowfort.social/posts/6857824
https://www.pillowfort.social/posts/6857771
https://www.pillowfort.social/posts/6857636
https://www.pillowfort.social/posts/6857585
https://www.pillowfort.social/posts/6857537
https://www.pillowfort.social/posts/6857479
https://www.pillowfort.social/posts/6857340
https://www.pillowfort.social/posts/6857163

#777 By 4240821 (82.115.4.100) at 1/8/2026 11:23:34 AM
https://www.pillowfort.social/posts/6876021
https://www.pillowfort.social/posts/6875904
https://www.pillowfort.social/posts/6875863
https://www.pillowfort.social/posts/6875772
https://www.pillowfort.social/posts/6875722
https://www.pillowfort.social/posts/6875615
https://www.pillowfort.social/posts/6875570
https://www.pillowfort.social/posts/6875539
https://www.pillowfort.social/posts/6875505
https://www.pillowfort.social/posts/6875458

#778 By 4240821 (82.115.4.100) at 1/9/2026 11:27:25 AM
https://www.pillowfort.social/posts/6970729
https://www.pillowfort.social/posts/6970621
https://www.pillowfort.social/posts/6970581
https://www.pillowfort.social/posts/6970536
https://www.pillowfort.social/posts/6970477
https://www.pillowfort.social/posts/6970407
https://www.pillowfort.social/posts/6970348
https://www.pillowfort.social/posts/6970277
https://www.pillowfort.social/posts/6970218
https://www.pillowfort.social/posts/6970049

#779 By 4240821 (193.39.208.35) at 1/10/2026 5:30:59 PM
https://www.pillowfort.social/posts/7077036
https://www.pillowfort.social/posts/7076841
https://www.pillowfort.social/posts/7076681
https://www.pillowfort.social/posts/7076508
https://www.pillowfort.social/posts/7076401
https://www.pillowfort.social/posts/7076321
https://www.pillowfort.social/posts/7076236
https://www.pillowfort.social/posts/7076175
https://www.pillowfort.social/posts/7076104
https://www.pillowfort.social/posts/7075965

Write Comment
Return to News
  Displaying 776 through 779 of 779
Prev | First
  The time now is 1:53:26 AM ET.
Any comment problems? E-mail us
User name and password:

 

  *  
  *   *