Today we released the fix for CVE-2010-0816 in MS10-030
. This vulnerability affects Outlook Express, Windows Mail, and Windows Live Mail. We recommend that you install the update as soon as possible, but realize that some customers may need to prioritize which updates they install first. While the vulnerability is rated critical, many customers may not be affected by it. This blog post should help you better understand the risk associated with this vulnerability. Windows 7
Default installations of Windows 7 are not affected by this vulnerability because they do not include Windows Live Mail. Windows Live Mail is available as a free download for Windows 7, but is not included in the operating system by default. Attack scenarios
- Attacker intercepts and manipulates a userís POP3 or IMAP connection to a legitimate email server. (Man-in-the-middle attack)
- Attacker entices a user to connect to a malicious email server using either the POP3 or IMAP protocol
Attack vector details
- It is not possible for an attacker to exploit this vulnerability by simply sending a malicious email.
- If you use an affected email program, but do not use POP3 or IMAP (e.g. you connect to an Exchange Server), you are not affected by this vulnerability, although we still recommend that you install the update
The most likely attack vector involves an attacker attempting to intercept and modify legitimate POP3 or IMAP communications going across an untrusted network, such as a Wi-Fi hotspot in a coffee shop. However, this attack would be less likely to succeed if those POP3 or IMAP sessions used SSL, an option available in your email account configuration if your server supports it.
- Malicious email server
A less likely attack vector involves an attacker convincing or forcing a user to connect to a malicious email server. Convincing a user to change their email client configuration to connect to a malicious email server would require significant social engineering, and so it is less likely to be successful. Forcing a user to connect to a malicious email server would require the attacker to be able to redirect the userís connection attempt from a legitimate email server to a malicious one. However, to accomplish this attack, the attacker would either need access to the userís local area network, or have some way to poison the DNS entry for the email server.