Questionable security policies in Outlook 2002

From: Richard M. Smith (rmsat_private)
Date: Wed Mar 20 2002 - 15:11:33 PST

  • Next message: hellNbak: "RE: [VulnWatch] NMRC Advisory - KeyManager Issue in ISS RealSecur e on Nokia Appliances"

    Hello,
    
    I have found a number of questionable security policies in Outlook 2002
    which allow the "bad guys" to bypass some of the security features which
    where introduced in the Outlook security patch.  These problems likely
    affect earlier versions of Outlook as well as Outlook Express.   
    
    Here is the list of problems:
    
    Problem #1: In an HTML email message, Outlook will automatically
    download an executable file from a Web site whose URL is specified in an
    IFRAME tag embedded in the message.  The download happens when the email
    message is read.  Outlook will put up a dialog box asking a user if they
    want to open the file (i.e., run the executable), save it, or cancel the
    download.  There is no security warning that the executable file might
    be dangerous.  Unfortunately, the default action of the dialog is
    "Open".
    
    Recommendation:  IFRAMEs should be restricted to HTML, image, and text
    files.  If an IFRAME attempts to download another kind of file, then the
    file should be discarded.  Outlook 2002 already discards executable
    files attached to an email message, so it should do the same thing with
    executable files in IFRAMEs.  The dialog message is particularly
    confusing in Outlook since a user never initiated the download in the
    first place.  (As a side note, Hotmail already offers this protection.)
    
    Problem #2:  In an HTML email message, JavaScript code can still be
    executed in spite of the fact that scripting is turned off by default in
    Outlook.  The trick is to embed the JavaScript code in either an
    "about:" or "javascript:" URL that is used an HTML <a href=> tag.  When
    the link is clicked on, the JavaScript code in the link will be
    executed.  In Outlook, URLs are limited to about 2,000 characters which
    is probably enough space to contain a simple worm which could exploit
    one of the known Internet Explorer security holes.  
    
    Recommendation:  about: and javascript: URLs should be disabled in
    Outlook. (As a side note, Hotmail already offers this protection.)
    
    Problem #3:  Cookies can be set and read in HTML email messages in spite
    of the fact that the default security settings in Outlook 2002 claim
    that cookies are turned off.  This is a privacy leak problem and not a
    security hole.  For information of the implications of this leak, see
    http://www.computerbytesman.com/privacy/cookleak.htm.
    
    Recommendation:  This is a software bug that just needs to be fixed.
    
    Problem #4:  The Outlook and the Internet Explorer (IE) development
    groups at Microsoft just can't seem to agree how dangerous .URL files
    are.  The Outlook group sees them as security threat, while the IE group
    does not.  This disagreement makes the "Send a Link" command in IE
    cumbersome and confusing to use.  If one emails a friend the link of a
    Web page using the  command, IE generates an email message with the link
    in the body of the email message plus a second copy of the link in an
    attached .URL file.  When the message is sent, Outlook proceeds to
    generate an annoying "security" warning dialog box saying that the
    attached .URL file might be dangerous.  How a link to a Web page can be
    dangerous is mystery to me.  The only option is to send the message with
    the "dangerous" .URL or abort the send.  Outlook doesn't appear to have
    any method for removing a "dangerous" .URL file from an outgoing
    message.
    
    When I spoke to Microsoft about this particular issue last year, I was
    told that the Outlook group is concerned that a .URL file might point to
    a .EXE file instead of a Web page.  The "bad guys" could use a .URL file
    then to download and run malicious executables.  
    
    Recommendation:  There are two solutions to this battle between the
    Outlook and IE groups.  Either IE should stop generating .URL files in
    email messages or Outlook should be smarter about its handling of them.
    For example, Outlook can safely allow through a .URL file that points to
    a Web page, but reject ones that point to an executable file.  Something
    needs to be done here because the current operation of the "Send a link"
    command is very confusing because Outlook is constantly "crying wolf".
    
    I brought all of these issues to Microsoft's attention over the last 12
    months.  I am not sure what Microsoft's plan are for addressing them.
    Problem #1 seems most critical.
    
    Richard M. Smith
    http://www.ComputerBytesMan.com
    



    This archive was generated by hypermail 2b30 : Thu Mar 21 2002 - 10:55:30 PST