Outlook (Express) S/MIME Certificate Chain Vulnerability

Discussion in 'other security issues & news' started by Paul Wilders, Sep 3, 2002.

Thread Status:
Not open for further replies.
  1. Paul Wilders

    Paul Wilders Administrator

    Joined:
    Jul 1, 2001
    Posts:
    12,475
    Location:
    The Netherlands
    Summary
    Outlook's S/MIME implementation is vulnerable to the certificate chain spoofing attack, despite Microsoft's claim that IE is the only affected application. The vulnerability allows anyone to forge the digital signature on an email that is to be viewed with Outlook. No warnings are given, no dialogs are shown.


    Details
    Affected clients:
    * Mozilla is NOT vulnerable.
    * Outlook Express 5 is vulnerable (Tested on fully patched Win2k SP3 system)

    In a very similar way to the IE SSL vulnerability, an attacker generates a bad certificate chain:

    [Issuer:VeriSign | Subject:VeriSign] > [Issuer:VeriSign | Subject:www.thoughtcrime.org] > [Issuer:www.thoughtcrime.org | Subject:Bill Gates/billgates@microsoft.com]

    In addition, Outlook will fail to check the Basic Constraints on the intermediate certificate and accepts the leaf certificate as valid.

    Severity:
    As it stands, there is virtually no difference between signed and unsigned email in Outlook. Unless carefully inspected, signed email in Outlook is essentially meaningless. This also applies to any signed email received over the past 5+ years.

    Prudent users who must continue using Outlook for signed email should manually inspect and verify received certificate chains.

    Exploit:
    erased - Forum Admin

    Vendor Notification Status:
    Microsoft knows about this, of course, but "isn't even sure whether to call this a 'vulnerability'" according to their official response.

    -----

    source: securiteam
     
Thread Status:
Not open for further replies.
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.