-----BEGIN PGP SIGNED MESSAGE-----

===========================================================================
             AUSCERT External Security Bulletin Redistribution

           ESB-2002.676 -- Microsoft Security Bulletin MS02-067
  E-mail Header Processing Flaw Could Cause Outlook 2002 to Fail (331866)
                             05 December 2002

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:                Outlook 2002
Vendor:                 Microsoft
Operating System:       Windows
Impact:                 Denial of Service
Access Required:        Remote

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----

- - ----------------------------------------------------------------------
Title:      E-mail Header Processing Flaw Could Cause Outlook 2002
            to Fail (331866)
Date:       04 December 2002
Software:   Microsoft Outlook 2002
Impact:     Denial of Service
Max Risk:   Moderate
Bulletin:   MS02-067

Microsoft encourages customers to review the Security Bulletins at: 
http://www.microsoft.com/technet/security/bulletin/MS02-067.asp
http://www.microsoft.com/security/security_bulletins/MS02-067.asp
- - ----------------------------------------------------------------------

Issue:
======
Microsoft Outlook provides users with the ability to work with
e-mail, contacts, tasks, and appointments. Outlook e-mail handling
includes receiving, displaying, creating, editing, sending, and
organizing e-mail messages. When working with received e-mail
messages, Outlook processes information contained in the header of
the e-mail which carries information about where the e-mail came
from, its destination, and attributes of the message.

A vulnerability exists in Outlook 2002 in its processing of e-mail
header information. An attacker who successfully exploited the
vulnerability could send a specially malformed e-mail to a user of
Outlook 2002 that would cause the Outlook client to fail under
certain circumstances. The Outlook 2002 client would continue to
fail so long as the specially malformed e-mail message remained on
the e-mail server. The e-mail message could be deleted by an e-mail
administrator, or by the user via another e-mail client such as
Outlook Web Access or Outlook Express, after which point the
Outlook 2002 client would again function normally.

Mitigating Factors:
====================
 - Outlook 2002 clients connecting to e-mail servers using the
   MAPI protocol are not affected. Only Outlook 2002 clients using
   POP3, IMAP, or WebDAV protocols are vulnerable.

 - The vulnerability does not affect Outlook 2000 or Outlook Express.

 - The vulnerability is a denial of service vulnerability only.
   The attacker would not be able to access the user?s e-mail or
   system in any way. The vulnerability could not be used to read,
   delete, create, or alter the user?s e-mail. 

 - If an attacker was able to send a specially malformed e-mail that
   successfully exploited this vulnerability, the specially
   malformed e-mail could be deleted either by an e-mail
   administrator, or by the user via another e-mail client such as
   Outlook Web Access or Outlook Express. Once the specially
   malformed e-mail has been removed, normal operation would resume.

Risk Rating:
============
 - Moderate

Patch Availability:
===================
 - A patch is available to fix this vulnerability. Please read the 
   Security Bulletin at
   http://www.microsoft.com/technet/security/bulletin/ms02-067.asp
   for information on obtaining this patch.

Acknowledgment:
===============
 - Richard Lawley

- - ---------------------------------------------------------------------

THE INFORMATION PROVIDED IN THE MICROSOFT KNOWLEDGE BASE IS PROVIDED
"AS IS" WITHOUT WARRANTY OF ANY KIND. MICROSOFT DISCLAIMS ALL 
WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING THE WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. IN NO EVENT 
SHALL MICROSOFT CORPORATION OR ITS SUPPLIERS BE LIABLE FOR ANY
DAMAGES WHATSOEVER INCLUDING DIRECT, INDIRECT, INCIDENTAL,
CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR SPECIAL DAMAGES, EVEN IF
MICROSOFT CORPORATION OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE
POSSIBILITY OF SUCH DAMAGES. SOME STATES DO NOT ALLOW THE EXCLUSION
OR LIMITATION OF LIABILITY FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES
SO THE FOREGOING LIMITATION MAY NOT APPLY.

- -----BEGIN PGP SIGNATURE-----
Version: PGP 7.1

iQEVAwUBPe5ejo0ZSRQxA/UrAQGGCwf/fCc/EakgoYYoT0CHxlWV/0xGi7N6/Dr6
d/eEhu8fYujZ2flicJOGD96wOBqhTJoabMNzMQVLQMswgRvvVLewnXolR6EhdGTN
AX+XuNYizNOdhJuc5GYHmOl6K9Dr3DnBObXXBf0YqDcdmHssx8XJ5sHKcf/eP/6K
t9HevpcNOamjtT20rvu0mcKkrFxb5uwGXWfFl+nHW7faPOp56JTyoKHkQjtLiq1c
33TeDGJOz3Gm6uLZU0juJ9UyNh0GqN2UqjrYn7sMRTOR1si0O/Qr16ZV6rD8Rhn8
V6pH36kXsj7CRVkYlXkEaFnmohy9fghkXTPLTG/DBxqupoI923ywhg==
=S3ww
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content.  The decision to use any or all of this information is
the responsibility of each user or organisation, and should be done so in
accordance with site policies and procedures.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the original authors to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

If you believe that your system has been compromised, contact AusCERT or
your representative in FIRST (Forum of Incident Response and Security
Teams).

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business 
                hours which are GMT+10:00 (AEST).  On call after hours 
                for member emergencies only.

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: noconv
Comment: http://www.auscert.org.au/render.html?it=1967

iQCVAwUBPe89FCh9+71yA2DNAQHY9wP/RrKUvn46BaXX+v9Nv33hVvVagEySFQXO
at4aokXkX8OU1woDAfpN2yEc8Bq+lxXXijaCgamy2dWCdWmYQ0YJCgteVDeJCI62
YBu4pMjDU/NYd3rwq2itEtGVuDrSIBBVZKceCXL9H/1U2lNM0jV52Yc1S2qsKIdC
wWRYJCaSf5g=
=ZFJz
-----END PGP SIGNATURE-----