Vulnerability Note VU#124113
Microsoft Exchange Outlook Web Access UTF character set label script injection vulnerability
Microsoft Exchange Outlook Web Access (OWA) fails to properly handle the UTF character set label, which can allow a remote, unauthenticated attacker to execute script within the security context of the OWA user.
OWA allows users to access their email accounts on a Microsoft Exchange server from another host through a web browser. When a user opens a script-based email attachment, the web browser may execute the script on the client side. If executed, the script would have all the privileges of the OWA user, including access to and manipulation of messages and folders on the server.
A remote attacker with the ability to supply an email message containing specially crafted script may be able to execute the script in the security context of the victim user on the client system. For more information about this type of vulnerability, please see CERT Advisory CA-2000-02.
Apply an update
This issue is addressed in Microsoft Security Bulletin MS07-026.
Systems Affected (Learn More)
|Vendor||Status||Date Notified||Date Updated|
|Microsoft Corporation||Affected||-||08 May 2007|
CVSS Metrics (Learn More)
- Improper authorization checking in IOS FTP server
This vulnerability was reported by Microsoft, who in turn credit Martijn Brinkers of Izecom.
This document was written by Will Dormann.
- CVE IDs: CVE-2007-0220
- Date Public: 08 May 2007
- Date First Published: 08 May 2007
- Date Last Updated: 09 May 2007
- Severity Metric: 5.46
- Document Revision: 5
If you have feedback, comments, or additional information about this vulnerability, please send us email.