Home page logo

fulldisclosure logo Full Disclosure mailing list archives

Re: Security issue in Microsoft Outlook
From: Dan Margolis <bugtraq.lists.dmargoli () af0 net>
Date: Fri, 20 May 2005 14:24:50 -0400

On Wed, May 18, 2005 at 01:27:45PM -0700, Bakchodiya wrote:
An issue has been discovered in MS Outlook (All
Versions) where anyone can fake a URL & send it

How does it work:

Lets compose an email in MS Outlook, lets type

http://www.cybertrion.com & put a space after it to
make it a link. Now put your cursor just before
cybertrion & type any URL for eg: 
http://www.foo-labs.info now send it to anyone. The
receiver will see the URL as http://www.foo-labs.info
but when he clicks on it it will directly take him to

I am not sure how critical this is but it can fool
alot of people & result in download of a virus.

Wow. MS really fucked up on this one. 

FYI, though, I've confirmed this vulnerability on Outlook 2003, IE6,
and, shockingly, Mozilla Thunderbird, Firefox, Opera, and Safari. In
fact, it almost seems as if *every* browser or other application that
renders HTML has this "feature" of displaying the text inside a <a> tag!

I, for one, am shocked and apalled that anyone could be so irresponsible
as to write such a vulnerability into production code. By allowing
links in their HTML pages, application writers make it trivially easy to
trick viewers into visiting web sites they didn't intend to! This can
lead to phishing attacks, viruses, widespread panic, and mass hysteria! 

Severity ranking: High!

PS: If you weren't talking about just changing the link text, I
apologize for the above sarcasm. 

Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]