Microsoft Security Bulletin MS02-058
Unchecked Buffer in Outlook Express S/MIME Parsing Could Enable System Compromise (Q328676)
Originally posted: October 10, 2002
Who should read this bulletin:
Customers using Microsoft® Outlook Express
Impact of vulnerability:
Run code of attackers choice.
Maximum Severity Rating:
Customers using Outlook Express should apply the patch
- Microsoft Knowledge Base article Q328676 discusses this issue and will be available approximately 24 hours after the release of this bulletin. Knowledge Base articles can be found on the Microsoft Online Support web site.
- Technical support is available from Microsoft Product Support Services. There is no charge for support calls associated with security patches.
Security Resources: The Microsoft TechNet Security Web Site provides additional information about security in Microsoft products.
The information provided in the Microsoft Knowledge Base is provided "as is" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.
- V1.0 (October 10, 2002): Bulletin Created.
- V1.1 (October 11, 2002): Caveats section updated to provide information on the warning message that is displayed when the patch is installed on a system that does not require it.
- V1.2 (October 11, 2002): Affected Software section updated to emphasise that this fix is included in Windows XP Service Pack 1 and Internet Explorer 6.0 Service Pack 1.