An interaction between Windows Media Player (WMP) and Outlook 2002 allows remote attackers to bypass Outlook security settings and execute Javascript via an IFRAME in an HTML email message that references .WMS (Windows Media Skin) or other WMP media files, whose onload handlers execute the player.LaunchURL() Javascript function.
References
Link | Resource |
---|---|
http://online.securityfocus.com/archive/1/263429 | Vendor Advisory |
http://www.iss.net/security_center/static/8604.php | Vendor Advisory |
http://www.securityfocus.com/bid/4340 | Patch Vendor Advisory |
http://online.securityfocus.com/archive/1/263429 | Vendor Advisory |
http://www.iss.net/security_center/static/8604.php | Vendor Advisory |
http://www.securityfocus.com/bid/4340 | Patch Vendor Advisory |
Configurations
History
20 Nov 2024, 23:39
Type | Values Removed | Values Added |
---|---|---|
References | () http://online.securityfocus.com/archive/1/263429 - Vendor Advisory | |
References | () http://www.iss.net/security_center/static/8604.php - Vendor Advisory | |
References | () http://www.securityfocus.com/bid/4340 - Patch, Vendor Advisory |
Information
Published : 2002-08-12 04:00
Updated : 2024-11-20 23:39
NVD link : CVE-2002-0481
Mitre link : CVE-2002-0481
CVE.ORG link : CVE-2002-0481
JSON object : View
Products Affected
microsoft
- outlook
CWE