Windows 7 Forums
Welcome to Windows 7 Forums. Our forum is dedicated to helping you find support and solutions for any problems regarding your Windows 7 PC be it Dell, HP, Acer, Asus or a custom build. We also provide an extensive Windows 7 tutorial section that covers a wide range of tips and tricks.


Windows 7: MS10-030: Malicious Mail server vulnerability

12 May 2010   #1
JMH

Win 7 Ultimate 64-bit. SP1.
 
 
MS10-030: Malicious Mail server vulnerability

Quote:
Today we released the fix for CVE-2010-0816 in MS10-030. This vulnerability affects Outlook Express, Windows Mail, and Windows Live Mail. We recommend that you install the update as soon as possible, but realize that some customers may need to prioritize which updates they install first. While the vulnerability is rated critical, many customers may not be affected by it. This blog post should help you better understand the risk associated with this vulnerability.

Windows 7

Default installations of Windows 7 are not affected by this vulnerability because they do not include Windows Live Mail. Windows Live Mail is available as a free download for Windows 7, but is not included in the operating system by default.


Attack scenarios
  • Attacker intercepts and manipulates a userís POP3 or IMAP connection to a legitimate email server. (Man-in-the-middle attack)
  • Attacker entices a user to connect to a malicious email server using either the POP3 or IMAP protocol
Non-vulnerable scenarios
  • It is not possible for an attacker to exploit this vulnerability by simply sending a malicious email.
  • If you use an affected email program, but do not use POP3 or IMAP (e.g. you connect to an Exchange Server), you are not affected by this vulnerability, although we still recommend that you install the update
Attack vector details
  • Man-in-the-middle
    The most likely attack vector involves an attacker attempting to intercept and modify legitimate POP3 or IMAP communications going across an untrusted network, such as a Wi-Fi hotspot in a coffee shop. However, this attack would be less likely to succeed if those POP3 or IMAP sessions used SSL, an option available in your email account configuration if your server supports it.
  • Malicious email server
    A less likely attack vector involves an attacker convincing or forcing a user to connect to a malicious email server. Convincing a user to change their email client configuration to connect to a malicious email server would require significant social engineering, and so it is less likely to be successful. Forcing a user to connect to a malicious email server would require the attacker to be able to redirect the userís connection attempt from a legitimate email server to a malicious one. However, to accomplish this attack, the attacker would either need access to the userís local area network, or have some way to poison the DNS entry for the email server.
More...
Security Research & Defense : MS10-030: Malicious Mail server vulnerability


My System SpecsSystem Spec
Reply

 MS10-030: Malicious Mail server vulnerability




Thread Tools





Similar help and support threads
Thread Forum
what is POP mail server . . ?
I have a problem with my massanger especially my email > its gave me a note on the up (( Get your ** REMOVED** mail right in Hotmail You can read and send messages from other email accounts without signing in to different places. Get started )) what is that mean please ?
Browsers & Mail
WLM 2011 how to leave POP mail on server
I have WLM 2011, is there a way to leave a mail on the server and delete it after X days as in OL express? If not what does one do? thanks Mordy
Browsers & Mail
Server (WINDOWS 2008) Mail Issue (MAIL ENABLE)
Hi I am desperate to resolve this issue, as I have been getting this 0x800ccc0e error from Outlook on my laptop, regarding failure to connect to my virtual server (apache tomcat running windows server 2008) I tried to connect to my email via Webmail on Plesk, and received a failed login. The...
Browsers & Mail
Windows 7 x64 And Server 2008 R2 Vulnerability Emerges
Security Advisory 2028859 Released Hello all. As we start the week weíre investigating a publicly reported vulnerability in the Windows Canonical Display Driver (cdd.dll) and have released Security Advisory 2028859 to describe our findings. Weíre not aware of any current customer impact as a...
News
Alert:Threat Type: Malicious Web Site / Malicious Code
Source - Office.Microsoft.Com Search Results Can Lead To Rogue Anti-Virus - Security Labs Alert
Security News
No mail server client any recommendations?
No mail server client came with W7, that i can find, any recommendations? Thx Dorothy
Browsers & Mail

Our Sites

Site Links

About Us

Find Us

Windows 7 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 7" and related materials are trademarks of Microsoft Corp.

© Designer Media Ltd

All times are GMT -5. The time now is 17:50.

Twitter Facebook Google+



Windows 7 Forums

Seven Forums Android App Seven Forums IOS App