An information disclosure vulnerability exists when attaching files to Outlook messages. This vulnerability could potentially allow users to share attached files such that they are accessible by anonymous users where they should be restricted to specific users.
To exploit this vulnerability, an attacker would have to attach a file as a link to an email. The email could then be shared with individuals that should not have access to the files, ignoring the default organizational setting.
The security update addresses the vulnerability by correcting how Outlook handles file attachment links.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/169960/Microsoft-Outlook-2019-16.0.12624.20424-Out-Of-Bounds-Read.html | Third Party Advisory VDB Entry |
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1493 | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
03 Jul 2024, 01:36
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-922 |
19 Jan 2024, 00:15
Type | Values Removed | Values Added |
---|---|---|
Summary | An information disclosure vulnerability exists when attaching files to Outlook messages. This vulnerability could potentially allow users to share attached files such that they are accessible by anonymous users where they should be restricted to specific users. To exploit this vulnerability, an attacker would have to attach a file as a link to an email. The email could then be shared with individuals that should not have access to the files, ignoring the default organizational setting. The security update addresses the vulnerability by correcting how Outlook handles file attachment links. |
04 Jan 2024, 02:15
Type | Values Removed | Values Added |
---|---|---|
Summary | <p>An information disclosure vulnerability exists when attaching files to Outlook messages. This vulnerability could potentially allow users to share attached files such that they are accessible by anonymous users where they should be restricted to specific users.</p> <p>To exploit this vulnerability, an attacker would have to attach a file as a link to an email. The email could then be shared with individuals that should not have access to the files, ignoring the default organizational setting.</p> <p>The security update addresses the vulnerability by correcting how Outlook handles file attachment links.</p> | |
References | (MISC) http://packetstormsecurity.com/files/169960/Microsoft-Outlook-2019-16.0.12624.20424-Out-Of-Bounds-Read.html - Third Party Advisory, VDB Entry |
21 Nov 2022, 18:15
Type | Values Removed | Values Added |
---|---|---|
CWE | NVD-CWE-noinfo | |
References |
|
Information
Published : 2020-08-17 19:15
Updated : 2024-07-03 01:36
NVD link : CVE-2020-1493
Mitre link : CVE-2020-1493
CVE.ORG link : CVE-2020-1493
JSON object : View
Products Affected
microsoft
- 365_apps
- outlook
- office
CWE