| |
|

|
|
User Controls
|
|
New User
|
|
Login
|
|
Edit/View My Profile
|
|

|
|

|
|

|
|
ActiveMac
|
|
Articles
|
|
Forums
|
|
Links
|
|
News
|
|
News Search
|
|
Reviews
|
|

|
|

|
|

|
|
News Centers
|
|
Windows/Microsoft
|
|
DVD
|
|
ActiveHardware
|
|
Xbox
|
|
MaINTosh
|
|
News Search
|
|

|
|

|
|

|
|
ANet Chats
|
|
The Lobby
|
|
Special Events Room
|
|
Developer's Lounge
|
|
XBox Chat
|
|

|
|

|
|

|
|
FAQ's
|
|
Windows 98/98 SE
|
|
Windows 2000
|
|
Windows Me
|
|
Windows "Whistler" XP
|
|
Windows CE
|
|
Internet Explorer 6
|
|
Internet Explorer 5
|
|
Xbox
|
|
DirectX
|
|
DVD's
|
|

|
|

|
|

|
|
TopTechTips
|
|
Registry Tips
|
|
Windows 95/98
|
|
Windows 2000
|
|
Internet Explorer 4
|
|
Internet Explorer 5
|
|
Windows NT Tips
|
|
Program Tips
|
|
Easter Eggs
|
|
Hardware
|
|
DVD
|
|

|
|

|
|

|
|
Latest Reviews
|
|
Applications
|
|
Microsoft Windows XP Professional
|
|
Norton SystemWorks 2002
|
|

|
|
Hardware
|
|
Intel Personal Audio Player
3000
|
|
Microsoft Wireless IntelliMouse
Explorer
|
|

|
|

|
|

|
|
Site News/Info
|
|
About This Site
|
|
Affiliates
|
|
ANet Forums
|
|
Contact Us
|
|
Default Home Page
|
|
Link To Us
|
|
Links
|
|
Member Pages
|
|
Site Search
|
|
Awards
|
|

|
|

|
|

|
|
Credits
©1997/2004, Active Network. All
Rights Reserved.
Layout & Design by
Designer Dream. Content
written by the Active Network team. Please click
here for full terms of
use and restrictions or read our
Privacy Statement.
|
|
|
 |
|
 |
|
 |
| Time:
01:30 EST/06:30 GMT | News Source:
ActiveWin.com |
Posted By: Robert Stein |
|
A remote code execution vulnerability exists in Microsoft Outlook and Microsoft Exchange Server because of the way that it decodes the Transport Neutral Encapsulation Format (TNEF) MIME attachment.
An attacker could exploit the vulnerability by constructing a specially crafted TNEF message that could potentially allow remote code execution when a user opens or previews a malicious e-mail message or when the Microsoft Exchange Server Information Store processes the specially crafted message.
An attacker who successfully exploited this vulnerability could take complete control of an affected system.
|
| |
|
|
 |
|