Vulnerability Note VU#124113

Microsoft Exchange Outlook Web Access UTF character set label script injection vulnerability

Original Release date: 08 May 2007 | Last revised: 09 May 2007


Microsoft Exchange Outlook Web Access (OWA) fails to properly handle the UTF character set label, which can allow a remote, unauthenticated attacker to execute script within the security context of the OWA user.


OWA allows users to access their email accounts on a Microsoft Exchange server from another host through a web browser. When a user opens a script-based email attachment, the web browser may execute the script on the client side. If executed, the script would have all the privileges of the OWA user, including access to and manipulation of messages and folders on the server.


A remote attacker with the ability to supply an email message containing specially crafted script may be able to execute the script in the security context of the victim user on the client system. For more information about this type of vulnerability, please see CERT Advisory CA-2000-02.


Apply an update

This issue is addressed in Microsoft Security Bulletin MS07-026.


Microsoft Security Bulletin MS07-026 provides several workarounds, including disabling OWA and restricting HTML attachments.

Systems Affected (Learn More)

VendorStatusDate NotifiedDate Updated
Microsoft CorporationAffected-08 May 2007
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

Group Score Vector
Base N/A N/A
Temporal N/A N/A
Environmental N/A N/A



This vulnerability was reported by Microsoft, who in turn credit Martijn Brinkers of Izecom.

This document was written by Will Dormann.

Other Information

  • CVE IDs: CVE-2007-0220
  • Date Public: 08 May 2007
  • Date First Published: 08 May 2007
  • Date Last Updated: 09 May 2007
  • Severity Metric: 5.46
  • Document Revision: 5


If you have feedback, comments, or additional information about this vulnerability, please send us email.