Summary
This host is missing an important security update according to Microsoft Bulletin MS13-094.
Impact
Successful exploitation will allow remote attackers to disclose certain sensitive information.
Impact Level: Application
Solution
Run Windows Update and update the listed hotfixes or download and update mentioned hotfixes in the advisory from the below link, https://technet.microsoft.com/en-us/security/bulletin/ms13-094
Insight
The flaw is due to an error during the expansion of the S/MIME certificate metadata when validating the X.509 certificate chain and can be exploited to gain knowledge IP addresses and open TCP ports from the host and the connected LAN via a specially crafted S/MIME certificate sent in an email.
Affected
Microsoft Outlook 2013
Microsoft Outlook 2007 Service Pack 3 and prior
Microsoft Outlook 2010 Service Pack 2 and prior
Detection
Get the vulnerable file version and check appropriate patch is applied or not.
References
- http://secunia.com/advisories/55574
- http://securitytracker.com/id/1029328
- http://support.microsoft.com/kb/2825644
- http://support.microsoft.com/kb/2837597
- http://support.microsoft.com/kb/2837618
- http://technet.microsoft.com/en-us/security/bulletin/ms13-094
- http://www.osvdb.org/99653
Updated on 2015-03-25
Severity
Classification
-
CVE CVE-2013-3905 -
CVSS Base Score: 5.0
AV:N/AC:L/Au:N/C:P/I:N/A:N
Related Vulnerabilities
- Microsoft File Handling Component Remote Code Execution Vulnerability (2922229)
- Microsoft ISA Server DNS - Denial Of Service (MS03-009)
- Microsoft VS Team Foundation Server SignalR XSS Vulnerability (2905244)
- Microsoft Windows Message Queuing Privilege Escalation Vulnerability (971032)
- Microsoft Active Directory Federation Services Information Disclosure Vulnerability (2873872)