| Check Point Reference: | CPAI-2006-036 |
| Date Published: | 11 Apr 2006 |
| Severity: | High |
| Last Updated: | Monday 07 May, 2007 |
| Source: | Microsoft Security Bulletin MS06-016 |
| Industry Reference: | CVE-2006-0014 |
| Protection Provided by: | |
| Who is Vulnerable? | Microsoft Windows 2000 Service Pack 4 Microsoft Windows XP SP1, SP2 Microsoft Windows XP Professional x64 Edition Microsoft Windows Server 2003 |
| Vulnerability Description | Microsoft Outlook Express is a commonly used email application. A vulnerability has been discovered in the file which contains the address book of Outlook Express, potentially allowing a malicious attacker to take control of the affected machine. |
| Update/Patch Avaliable | Apply patches: Microsoft Security Bulletin MS06-016 |
| Vulnerability Details | The vulnerability can be triggered when a malformed .wab (the extension of the address book file) is used by Outlook Express. The vulnerability creates a remote code execution condition, which can allow a malicious attacker to take control of the vulnerable machine and/or execute any piece of code. |