Continued from "Security Flaw in Microsoft Outlook".

Following are all the emails between Microsoft and myself that show the complete unwillingness on Microsoft's behalf to acknowledge and fix the problem reported to them.

The full, original emails are available here.

Roberto Franceschetti
LogSat Software
roberto@logsat.com

 

The series of emails To/From Christopher, finally resulting in case 5608 after heated conversations. A series of emails To/From Lennart, resulting in... nothing.
Hi Christopher, fair enough, I'll wait for Lennart.

Roberto

-----Original Message-----
From: Microsoft Security Response Center [mailto:secure@microsoft.com]
Sent: Friday, October 22, 2004 3:02 PM
To: roberto@logsat.com
Cc: Microsoft Security Response Center
Subject: RE: Security Vulnerability Report [5608lw]

Hello Roberto,

I have opened case 5608 to further investigate this. The case owner,
Lennart, will get in touch with you as soon as he has more information.

Thanks,
Christopher, CISSP

-----Original Message-----
From: Roberto Franceschetti [mailto:roberto@logsat.com]
Sent: Friday 22 October 2004 11:53
To: Microsoft Security Response Center
Subject: RE: Security Vulnerability Report

Hi Christopher,

This is inform the security response center that since my report is not
being recognized as a problem, and Microsoft firmly believes Outlook is
performing to specs, I have no other choice than to release the information
to CERT, SANS, AntiOnline and to relevant newsgroups. Companies that rely on
digital signatures need to understand the limitations and risks involved of
using them with Outlook,

My report will go out this weekend, but again if the issue is acknowledged
by Microsoft before that occurs, I'm more than willing to work with you to
wait while a patch is issued.

Roberto


________________________________

From: Roberto Franceschetti [mailto:roberto@logsat.com]
Sent: Thursday, October 21, 2004 10:58 PM
To: 'Microsoft Security Response Center'
Subject: RE: Security Vulnerability Report


================================
In other words, Outlook does not rely on the From
line as the signer, but uses the digital signature itself. Am I missing
what you are reporting here?
================================

Yes, you're missing what I'm reporting, and, pardon the bluntness, but
you're also missing how Outlook works.

As I mentioned in a previous email, the 1st forget email I sent I did not
forge the actual email itself as Outlook displays it. In the following email
to you I attached a second forged email (signed with a MS Certificate Server
certificate) that does show such a sample instead (simply mispelled my last
name in the email, Dranceschetti instead of Franceschetti in the sender -
roberto.dranceschetti@ocfl.net).

But since that was apparently too complex to understand, attached is yet
another forged copy of the Verisign-signed one that shows all the problems.
Contrary to what you stated, this email will show "Hackers Franceschetti
[hackers@logsat.com]" in the "From" section in Outlook, and if you
double-click on it, a dialog box with the same "impostor" pops up with the
details. In case this too is hard to understand, you'll find a screenshot as
well.

Now, I *have* modified the sender, in all forms possible. Outlook does not
see it. Now please refer to the section of the Outlook help file (link in
prev. email) that states that a digital signature:

"proves to the recipient that the message is from you and not from an
imposter"

I'd say that an email from hackers@logsat.com is an impostor, wouldn't you
say? So this *is* a big problem.

I'm honestly done with the explanations. Your bolded statement above is
clearly wrong, as you can see from the attached modified message (and
screenshots). that the From line is *not* taken from the certificate. I've
tried to help in making you understand the problem and the huge identity
theft it poses, but if you respond with the attitude "this is how it works,
it's right, and it's not going to change" I'm not going to waste more of my
time.

I've found what myself and many others see as a huge security hole in how
digital signatures are handled by Outlook. I've been very correct in letting
Microsoft know immediately about the problem, spending a considerable amonut
of time documenting it in detail for you to see. I've also spent time in
researching your statements and proving them wrong. Unless you forward all
this documentation to your superiors and I'm contacted by one of them, my
only choice will be to make all of this (including our conversations and
your responses - so much for thrustworthy computing....) public.

Roberto


-----Original Message-----
From: Microsoft Security Response Center [mailto:secure@microsoft.com
<mailto:secure@microsoft.com> ]
Sent: Thursday, October 21, 2004 9:44 PM
To: roberto@logsat.com
Cc: Microsoft Security Response Center
Subject: RE: Security Vulnerability Report

I completely agree the digital signature should verify not only the
message contents, but also the signer. In the case of your forged
message from Roberto Somebody_Else [hackers@logsat.com], the digital
signature (a few lines down in the display, "Signed By") still shows
roberto@logsat.com. In other words, Outlook does not rely on the From
line as the signer, but uses the digital signature itself. Am I missing
what you are reporting here?

In terms of your application to submit electronic cases, you could just
write it to use the digital signer, not the message sender, as the
verified submitter.

What would be interesting (and a big problem) is if you can modify the
message and still have Outlook show a valid signature of the original
signer.

Thanks,
Christopher, CISSP

-----Original Message-----
From: Roberto Franceschetti [mailto:roberto@logsat.com
<mailto:roberto@logsat.com> ]
Sent: Thursday 21 October 2004 18:20
To: Microsoft Security Response Center
Subject: RE: Security Vulnerability Report

Christopher,

The RFC2633 merely states what parts of the email S/MIME includes, and
as you correctly stated, it does not include the email's headers. That
is not the point. A digital signature in an email is supposed to verify,
along the validity of the S/MIME content, also the identity of the
sender. This is also made very clear in the Outlook help file
(http://office.microsoft.com/assistance/hfws.aspx?AssetID=HP052423541033
<http://office.microsoft.com/assistance/hfws.aspx?AssetID=HP052423541033>
&CTT=1&Origin=EC010230001033&QueryID=XUI66rUx90):

Digitally sign messages
Digitally signing a message applies your certificate (certificate: A
digital means of proving your identity. When you send a digitally signed
message you are sending your certificate and public key. Certificates
are issued by a certification authority, and like a driver's license,
can expire or be revoked.) (with the public key (public key: The key a
sender gives to a recipient so that the recipient can verify the
sender's signature and confirm that the message was not altered.
Recipients also use the public key to encrypt (lock) e-mail messages to
the sender.)) to the message. This proves to the recipient that the
message is from you and not from an imposter and that the message has
not been altered. Encrypting (encrypt: The process of converting plain,
readable text into cipher (scrambled) text. The sender uses the
recipient's public key to encrypt (lock) the e-mail message and
attachments.) a message is a separate process.

Please do not confuse what the S/MIME specifications are with the fact
that I can easily forge the identity of the parties in a digitally
signed email. This is clearly in violation of what a digital signature
is supposed to do (just refer to the bold in the help file above... and
note my signed hacker@logsat.com email address in the sample I sent,
clearly an imposter). And let's not forget that again, Outlook Express
(and other non-MS email clients) work just fine.

If you do not agree, we can always post this "non-security bug" to
newsgroups and see what the public thinks.

Roberto



-----Original Message-----
From: Microsoft Security Response Center [mailto:secure@microsoft.com
<mailto:secure@microsoft.com>
<mailto:secure@microsoft.com <mailto:secure@microsoft.com> > ]
Sent: Thursday, October 21, 2004 4:39 PM
To: roberto@logsat.com
Cc: Microsoft Security Response Center
Subject: RE: Security Vulnerability Report

Hello Roberto,

Thank you for getting back to me. I have done some initial investigation
on your issue. According to
http://www.microsoft.com/technet/prodtechnol/exchange/guides/E2k3MsgSecG
<http://www.microsoft.com/technet/prodtechnol/exchange/guides/E2k3MsgSecG>
<http://www.microsoft.com/technet/prodtechnol/exchange/guides/E2k3MsgSec
G>
uide/7b378caa-58c5-495e-a703-8691766b8406.mspx, Outlook 2000 and greater
use S/MIME version 3. Section 3.1 of the S/MIME Version 3 Message
Specification RFC at http://ietf.org/rfc/rfc2633.txt?number=2633
<http://ietf.org/rfc/rfc2633.txt?number=2633>
<http://ietf.org/rfc/rfc2633.txt?number=2633
<http://ietf.org/rfc/rfc2633.txt?number=2633> > says,
"A MIME entity that is the whole message includes only the MIME headers
and MIME body, and does not include the RFC-822 headers."

Based on this, it seems to me Outlook conforms to the standard for
S/MIME in not including the Sender or From addresses as part of the
signed message. Does this answer your concern, or am I misunderstanding
your report?

Thanks,
Christopher, CISSP

-----Original Message-----
From: Roberto Franceschetti [mailto:roberto@logsat.com
<mailto:roberto@logsat.com>
<mailto:roberto@logsat.com <mailto:roberto@logsat.com> > ]
Sent: Thursday 21 October 2004 11:51
To: Microsoft Security Response Center
Subject: RE: Security Vulnerability Report

Very well then, I guess we can use these emails as proof. FYI, please
note
that I also found the ftp security flaw in MS09-039, so I should not be
one
of the thousands who probably write you guys daily for nuances
(hopefully).

Attached are two emails signed with my Verisign digital certificate. One
is
original, unaltered. The other one I tampered with, altering the sender
to
make it look like some else. Outlook still treats it as absolutely
valid.
This of course is a rather big problem, being that digital signatures
are to
ensure that the original document is not altered by matching its hash
with
the one in the signature.

You can reach me on my cell at 407-925-**** for more info if I'm not at
the
office number.

I'd also request an acknoledgment when a fix will be ready (assuming I'm
not
making a huge mistake and this is a false alarm).

Roberto

-----Original Message-----
From: Microsoft Security Response Center [mailto:secure@microsoft.com
<mailto:secure@microsoft.com>
<mailto:secure@microsoft.com <mailto:secure@microsoft.com> > ]
Sent: Thursday, October 21, 2004 2:32 PM
To: Franceschetti, Roberto
Cc: Microsoft Security Response Center
Subject: RE: Security Vulnerability Report

Hello again,

I will be able to provide you a case number and the name of the case
owner once I open it. However, I cannot open a case without knowing more
information about the suspected vulnerability. You can read more about
our policies and practices at
http://www.microsoft.com/technet/security/topics/policy/msrpracs.mspx
<http://www.microsoft.com/technet/security/topics/policy/msrpracs.mspx>
<http://www.microsoft.com/technet/security/topics/policy/msrpracs.mspx
<http://www.microsoft.com/technet/security/topics/policy/msrpracs.mspx> >
.

Thanks,
Christopher, CISSP

-----Original Message-----
From: Roberto.Franceschetti@ocfl.net
[mailto:Roberto.Franceschetti@ocfl.net
<mailto:Roberto.Franceschetti@ocfl.net>
<mailto:Roberto.Franceschetti@ocfl.net
<mailto:Roberto.Franceschetti@ocfl.net> > ]
Sent: Thursday 21 October 2004 11:26
To: Microsoft Security Response Center
Subject: RE: Security Vulnerability Report

Hi Cristopher,

Due to the seriousness of the problem, please understand if I'll require
to be assigned a case number so I can refer to an entry in your
ticketing system should any future problems arise. Once that is done,
I'll be glad to walk you thru the steps to reproduce it.

Regards,

Roberto Franceschetti
Tel. 36-8509


-----Original Message-----
From: Microsoft Security Response Center [mailto:secure@microsoft.com
<mailto:secure@microsoft.com>
<mailto:secure@microsoft.com <mailto:secure@microsoft.com> > ]
Sent: Thursday, October 21, 2004 2:14 PM
To: Franceschetti, Roberto
Cc: Microsoft Security Response Center
Subject: RE: Security Vulnerability Report

Hello Roberto,

Thanks for your note. Unfortunately, I am not able to reproduce the
issue without more information. Would you please tell me the exact steps
to reproduce the problem?

Thanks,
Christopher, CISSP

-----Original Message-----
Sent: Wednesday 20 October 2004 20:08
To: Microsoft Security Response Center
Subject: Security Vulnerability Report

CONTACT INFORMATION
May we contact you about this report?
Yes
Name: Roberto Franceschetti
Email: roberto.franceschetti@ocfl.net
Phone:
COMPUTER INFORMATION
Manufacturer and model of your computer:
Computer model is irrelevant

Have you installed any additional hardware on the system?
No

Have you installed any operating system security patches?
Yes
You've asked for them...

Update Name Status Date Source
Windows Media Player 10 Successful Tuesday, September 14, 2004 Windows
Update website
Microsoft .NET Framework version 1.1 Canceled Wednesday, August 18, 2004
Windows Update website
Security Update for Windows XP (KB839645) Successful Wednesday, July 28,
2004 Windows Update website
Security Update for DirectX 9.0 (KB839643) Successful Wednesday, July
28, 2004 Windows Update website
Security Update for Windows XP (KB841873) Successful Wednesday, July 28,
2004 Windows Update website
Update for Background Intelligent Transfer Service (BITS) 2.0 and
WinHTTP 5.1 (KB842773) Successful Wednesday, July 28, 2004 Windows
Update website
Security Update for Windows XP (KB840315) Successful Wednesday, July 28,
2004 Windows Update website
Critical Update for ADODB.stream (KB870669) Successful Wednesday, July
28, 2004 Windows Update website
Cumulative Security Update for Outlook Express 6 SP1 (KB823353)
Successful Wednesday, July 28, 2004 Windows Update website
Security Update for Windows XP (KB828741) Successful Wednesday, June 23,
2004 Windows Update website
Security Update for Windows XP (KB840374) Successful Wednesday, June 23,
2004 Windows Update website
Q811114: Security Update (Windows XP or Windows XP Service Pack 1)
Successful Wednesday, June 23, 2004 Windows Update website
Update for Windows XP Shop for Music Online Link (KB833998) Successful
Saturday, May 01, 2004 Windows Update website
Update for Windows Media Player 9 Series (KB837272) Successful Saturday,
May 01, 2004 Windows Update website
Security Update for Windows XP (KB835732) Successful Saturday, May 01,
2004 Windows Update website
Security Update for Windows XP (KB828741) Successful Saturday, May 01,
2004 Windows Update website
Security Update for Windows XP (KB837001) Successful Saturday, May 01,
2004 Windows Update website
Critical Update for Internet Explorer 6 Service Pack 1 (KB831167)
Successful Saturday, May 01, 2004 Windows Update website
Cumulative Security Update for Outlook Express 6 Service Pack 1
(KB837009)
Successful Saturday, May 01, 2004 Windows Update website
Security Update for Windows XP (KB828028) Successful Tuesday, February
10, 2004 Windows Update website
Security Update for Microsoft Data Access Components (KB832483)
Successful Tuesday, February 10, 2004 Windows Update website
Cumulative Security Update for Internet Explorer 6 Service Pack 1
(KB832894)
Successful Tuesday, February 10, 2004 Windows Update website
Update for Microsoft Windows XP (KB826942) Successful Tuesday, December
30, 2003 Windows Update website
Update for Windows XP HighMAT Support in CD Writing Wizard
(KB831240) Successful Tuesday, December 30, 2003 Windows Update website
Update for Microsoft Windows XP (KB826942) Successful Tuesday, December
30, 2003 Windows Update website
Update for Windows XP HighMAT Support in CD Writing Wizard
(KB831240) Successful Tuesday, December 30, 2003 Windows Update website
Security Update for Windows XP (KB810217) Successful Friday, November
21, 2003 Windows Update website
Security Update for Microsoft Windows (KB824141) Successful Friday,
November 21, 2003 Windows Update website
Security Update for Microsoft Windows (KB823182) Successful Friday,
November 21, 2003 Windows Update website
Security Update for Microsoft Windows XP (KB825119) Successful Friday,
November 21, 2003 Windows Update website
Security Update for Microsoft Windows XP (KB828035) Successful Friday,
November 21, 2003 Windows Update website
Cumulative Security Update for Internet Explorer 6 SP1 (KB824145)
Successful Friday, November 21, 2003 Windows Update website
Update for Windows Media Player Script Commands (KB828026) Successful
Thursday, October 09, 2003 Windows Update website
Page 1 of 3
10/20/2004 http://v5.windowsupdate.microsoft.com/v5consumer/blank.aspx
<http://v5.windowsupdate.microsoft.com/v5consumer/blank.aspx>
<http://v5.windowsupdate.microsoft.com/v5consumer/blank.aspx
<http://v5.windowsupdate.microsoft.com/v5consumer/blank.aspx> >
October 2003, Cumulative Patch for Internet Explorer 6 Service Pack 1
(KB828750) Successful Thursday, October 09, 2003 Windows Update website
PCtel modem software update released on June 13 2003. Successful
Wednesday, September 24, 2003 Windows Update website
Recommended Update for Windows XP SP1 (KB822603) Successful Wednesday,
September 24, 2003 Windows Update website
Microsoft .NET Framework Service Pack 2, English Version Successful
Monday, September 22, 2003 Windows Update website
Sierra Wireless Inc Multifunction Driver Version 1.1.0.3 Failed
Thursday, September 11, 2003 Device Manager
Flaw In Windows Media Player May Allow Media Library Access (819639)
Successful Wednesday, September 10, 2003 Windows Update website
Security Update for Microsoft Windows (KB824105) Successful Wednesday,
September 10, 2003 Windows Update website
Security Update for Windows XP (KB824146) Successful Wednesday,
September 10, 2003 Windows Update website
DirectX 9.0b End -User Runtime Successful Monday, September 01, 2003
Windows Update website
Windows MovieMaker 2 Successful Friday, August 22, 2003 Windows Update
website
Windows Error Reporting: Recommended Update (Windows XP) Successful
Friday, August 22, 2003 Windows Update website
Q282010: Recommended Update for Microsoft Jet 4.0 Service Pack 7 (SP7)
- Windows XP
Successful Friday, August 22, 2003 Windows Update website
814995: Recommended Update Successful Friday, August 22, 2003 Windows
Update website
Recommended Update for Windows XP SP1 (817778) Successful Friday, August
22, 2003 Windows Update website
Security Update for Microsoft Data Access Components (823718) Successful
Friday, August 22, 2003 Windows Update website
August 2003, Cumulative Patch for Internet Explorer 6 Service Pack 1
(822925)
Successful Friday, August 22, 2003 Windows Update website
Q811114: Security Update (Windows XP or Windows XP Service Pack 1)
Successful Monday, August 18, 2003 Windows Update website
329170: Security Update Successful Monday, August 18, 2003 Windows
Update website
811630: Critical Update (Windows XP) Successful Monday, August 18, 2003
Windows Update website
Q323255: Security Update (Windows XP) Successful Monday, August 18, 2003
Windows Update website
814078: Security Update (Microsoft Jscript version 5.6, Windows 2000,
Windows XP) Successful Monday, August 18, 2003 Windows Update website
817787: Security Update Windows Media Player for XP Successful Monday,
August 18, 2003 Windows Update website
817606: Security Update (Windows XP) Successful Monday, August 18, 2003
Windows Update website
Security Update for Windows XP (819696) Successful Monday, August 18,
2003 Windows Update website
823559: Security Update for Microsoft Windows Successful Monday, August
18, 2003 Windows Update website
MS03-026: Security Update for Windows XP (823980) Successful Monday,
August 18, 2003 Windows Update website
810577: Security Update Successful Monday, August 18, 2003 Windows
Update website
810833: Security Update (Windows XP) Successful Monday, August 18, 2003
Windows Update website
810565: Critical Update Successful Monday, August 18, 2003 Windows
Update website
328310: Security Update Successful Monday, August 18, 2003 Windows
Update website
Q329115: Security Update (Windows XP) Successful Monday, August 18, 2003
Windows Update website
Q329390: Security Update Successful Monday, August 18, 2003 Windows
Update website
Security Update for Windows XP (329834) Successful Monday, August 18,
2003 Windows Update website
814033: Critical Update Successful Monday, August 18, 2003 Windows
Update website
Q329441: Critical Update Successful Monday, August 18, 2003 Windows
Update website
Page 2 of 3
10/20/2004 http://v5.windowsupdate.microsoft.com/v5consumer/blank.aspx
<http://v5.windowsupdate.microsoft.com/v5consumer/blank.aspx>
<http://v5.windowsupdate.microsoft.com/v5consumer/blank.aspx
<http://v5.windowsupdate.microsoft.com/v5consumer/blank.aspx> >
Security Update for Windows XP (815021) Successful Monday, August 18,
2003 Windows Update website
816093: Security Update Microsoft Virtual Machine (Microsoft VM)
Successful Monday, August 18, 2003 Windows Update website
Q817287: Critical Update (Catalog Database Corruption in Microsoft
Windows XP) Successful Monday, August 18, 2003 Windows Update website
811493: Security Update (Windows XP) Successful Monday, August 18, 2003
Windows Update website
821557: Security Update (Windows XP) Successful Monday, August 18, 2003
Windows Update website
330994: April 2003, Security Update for Outlook Express 6 SP1 Successful
Monday, August 18, 2003 Windows Update website
818529: June 2003, Cumulative Patch for Internet Explorer 6 Service Pack
1
Successful Monday, August 18, 2003 Windows Update website
Page 3 of 3
10/20/2004 http://v5.windowsupdate.microsoft.com/v5consumer/blank.aspx
<http://v5.windowsupdate.microsoft.com/v5consumer/blank.aspx>
<http://v5.windowsupdate.microsoft.com/v5consumer/blank.aspx
<http://v5.windowsupdate.microsoft.com/v5consumer/blank.aspx> >

AFFECTED PRODUCT

What product are you reporting a security vulnerability in?
Product Name:
MIcrosoft Outlook 2003
Product Version:
11.6359.6360

Have you installed any service packs for the product?:
Yes
SP1

Have you installed any security patches for the product?:
Yes
Installed updates for your Office 2003 products
Visio 2003 Update: KB831925

0 KB / Already Downloaded
0 KB / Download Time = 0 min at your connection speed
This update addresses a problem where Visio 2003 overwrites some
registry settings for msxml2.dll and msxml3.dll. The problem may prevent
applications utilizing these files from running properly.
More information...

Office 2003 Service Pack 1 - English version

0 KB / Already Downloaded
0 KB / Download Time = 0 min at your connection speed
Office 2003 Service Pack 1 (SP1) provides the latest updates to
Microsoft Office 2003. SP1 contains significant security enhancements,
in addition to stability and performance improvements. This download
applies to the following Office 2003 products: Access 2003, Access 2003
Runtime, Excel 2003, FrontPage 2003, Outlook 2003, PowerPoint 2003,
Publisher 2003, Word 2003, Office 2003 Web Components and Office XP Web
Components. SP1 also includes many performance and feature enhancements
for InfoPath 2003.
More information...

Visio 2003 Service Pack 1 - English version

0 KB / Already Downloaded
0 KB / Download Time = 0 min at your connection speed
Visio 2003 Service Pack 1 provides the latest updates to Microsoft
Office Visio 2003. Service Pack 1 (SP1) contains significant security
enhancements as well as stability and performance improvements. Some of
the fixes included with SP1 have been previously released as separate
updates. This service pack combines them into one update.
More information...

Update for Outlook 2003: Junk E-mail Filter (KB870765)

0 KB / Already Downloaded
0 KB / Download Time = 0 min at your connection speed
This optional update provides the Junk E-mail Filter in Microsoft Office
Outlook 2003 with a more current definition of the e-mail messages that
should be considered junk e-mail. This update was released in September
2004.
More information...


Installed updates for your Office XP products

Installed updates for your Office 2000 products
Office 2000 Service Release 1a - English version

0 KB / Already Downloaded
0 KB / Download Time = 0 min at your connection speed
Office 2000 Service Release 1a provides important product updates to
Office 2000. The Service Release is designed to install over the Web and
you first download a small setup program that determines the update file
set that needs to be downloaded. The typical update file set required is
approximately 26 MB. Last modified date: 12-May-2000
More information...

Outlook 2000 SR-1 View Control Security Update

0 KB / Already Downloaded
0 KB / Download Time = 0 min at your connection speed
This update helps prevent the Outlook View Control from being invoked by
scripting or Hypertext Markup Language (HTML) code on a Web page
potentially controlled by someone with malicious intent. Last modified
date: 16-August-2001.
More information...

Office 2000 Security Update: UA Control Vulnerability

0 KB / Already Downloaded
0 KB / Download Time = 0 min at your connection speed
The Office 2000 UA Control Update helps eliminate a security
vulnerability in the Microsoft Office 2000 suite of products. Since the
existing control could allow potential damaging actions by malicious
hackers, Microsoft recommends that all Office 2000 users install this
update. Last modified date: 12-May-2000.
More information...

Office 2000 Service Pack 3 - English version

0 KB / Already Downloaded
0 KB / Download Time = 0 min at your connection speed
Office 2000 Service Pack 3 (SP-3) provides the latest updates to
Microsoft Office 2000 and contains significant security enhancements as
well as stability and performance improvements. SP-3 updates the
following Office applications: Word 2000 SR-1, Excel 2000 SR-1, Outlook
2000 SR-1, PowerPoint 2000 SR-1, Access 2000 SR-1, FrontPage 2000 SR-1,
Publisher 2000 SR-1. Note that Office 2000 SP-3 includes the Outlook
2000 SR-1 Extended E-mail Security Update, but with increased
customization capabilities.
More information...

Office 2000 Security Patch: KB822035

0 KB / Already Downloaded
0 KB / Download Time = 0 min at your connection speed
The Office 2000 Security Patch: KB822035 offers the highest levels of
stability and security available for Microsoft Office 2000. This update
is part of Microsoft's continued effort to provide the latest product
updates to customers.
More information...

Word 2000 Security Patch: KB830347

0 KB / Already Downloaded
0 KB / Download Time = 0 min at your connection speed
This update addresses a flaw when opening a document containing certain
data values (the names of macros in the document) in Microsoft Word.
This flaw could allow arbitrary code to run when Word tries to open a
document containing maliciously crafted values. This update resolves
this vulnerability so that files containing these values are handled
appropriately.
More information...

Word 2000 Security Patch: KB824936

0 KB / Already Downloaded
0 KB / Download Time = 0 min at your connection speed
The Word 2000 Security Patch: KB824936 offers the highest levels of
stability and security available for Microsoft Word 2000. This update
is part of Microsoft's continued effort to provide the latest product
updates to customers.
More information...

Excel 2000 Security Patch: KB830349

0 KB / Already Downloaded
0 KB / Download Time = 0 min at your connection speed
Under certain scenarios it is possible for an Excel file to be modified
in such a way that a macro consisting of Excel 4.0 Macro Language (XLM)
commands could run with no warning issued. This update resolves that
vulnerability so that the appropriate macro blocking or warnings are
triggered.
More information...

Outlook 2000 Update: December 18, 2002 - English version

0 KB / Already Downloaded
0 KB / Download Time = 0 min at your connection speed
The Outlook 2000 Update: December 18, 2002 offers you the highest levels
of stability and security available for Microsoft Outlook 2000. This
update is part of Microsoft's continued effort to provide the latest
product updates to customers.
More information...

Office 2000 WordPerfect 5.x Converter Security Patch: KB824993 -
English version

0 KB / Already Downloaded
0 KB / Download Time = 0 min at your connection speed
This update provides you with the latest version of the Microsoft Office
2000 WordPerfect 5.x Converter and offers the highest levels of
stability and security available for the Office 2000 WordPerfect 5.x
Converter.
More information...

Access 2000 Snapshot Viewer Security Patch: KB826292 - English
version

0 KB / Already Downloaded
0 KB / Download Time = 0 min at your connection speed
This update provides you with the latest version of the Microsoft Access
2000 Snapshot Viewer and offers the highest levels of stability and
security available for the Access 2000 Snapshot Viewer.
More information...

Security Update for Office 2000: WordPerfect 5.x Converter (KB873380)
- English version

0 KB / Already Downloaded
0 KB / Download Time = 0 min at your connection speed
A vulnerability could allow arbitrary code to run when the system uses
the converter to open a maliciously crafted document. The update
resolves this vulnerability so that the files that the converter opens
are handled appropriately.



VULNERABLITY INFORMATION

Please describe the flaw in the product:
Digital signatures -
Emails in Outlook signed with S/MIME using either a commercial personal
certificate with Verisign or using a certificate issued by MS
Certificate Server can be altered. Outlook will not show any warnings
about the email being changed, the digital signature will still be
reported valid even though the message content has been modified and
parties involved in the signatures changed.
This is an extremely serious flaw as I can change any digitally signed
emails I want without Outlook ever noticing.
FYI - Outlook Express does not have this flaw.
Please contact me immediately, as I work with Orange County Govt., and
we discovered this huge problem while investigating the feasibility of
using digital signatures in the filing of electronic cases online. This
is definetly a showstopper.


Is the flaw present in the product in the default configuration?
Don't Know

Please tell us how to duplicate the problem in our laboratory:
I will only discuss this after being assinged a case number and spoke
with a live person.

Please describe how someone might mount an attack via the flaw:

Having access to email files, digitally signed emails are changed to
altered their content.

Please describe what the result of a successful attack would be:

Changing a digitally signed email without invalidating the signature.

Please provide any additional information that might be helpful in
investigating this issue:

My contact info is:

Roberto Franceschetti
roberto@logsat.com / roberto.franceschetti@ocfl.net
tel. 407-836-****


 
Hi Lennart,

While I'm deeply convinced that trying to please customers that really do
not understand the implication of their requests has de-facto invalidated
the reliability of using digital signatures with Outlook, your request to
ask for a second opinion from CERT is very reasonable. Yes, I'll be happy to
discuss this matter with you and them.

Roberto

-----Original Message-----
From: Microsoft Security Response Center [mailto:secure@microsoft.com]
Sent: Thursday, November 04, 2004 9:11 PM
To: roberto@logsat.com
Cc: Microsoft Security Response Center
Subject: RE: Security Vulnerability Report [5608lw]


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Hello Roberto,

I have had a long discussion with the product team about this and we
will look into possible ways to clarify both the design and intent of
signing email. I cannot commit to a time line or shipping mechanism
but some possible changes to the UI is being considered.
However, the feature is working as intended and, in fact, it is made
this way in no small part based on customer requests. I believe that
it used to verify the signature against the SMTP FROM field but this
was changed as it generated so many false positives as to in effect
render the feature unusable.

Another valid example where signatures wouldn't work is that posts
made to mailing lists frequently changes the From address to a proxy
address. PGP works in the same way, as you can see from e.g.
Microsoft's security bulletin mailers. They are signed using our PGP
key (secure@microsoft.com) but that is not the address the mail
originates from, this is similar to posts to public news groups.

Being able to protect the SMTP headers using either of these
mechanisms would be great but I don't think it is fully doable given
the constraints, especially in an enterprise environment.

I think it might be a good idea to involve CERT here if you like, to
get a second opinion. Would you like to engage in that discussion
together?
/Lennart

- -----Original Message-----
From: Roberto Franceschetti [mailto:roberto@logsat.com]
Sent: Friday, October 29, 2004 9:17 PM
To: Microsoft Security Response Center
Subject: RE: Security Vulnerability Report [5608lw]

Lennart,

As I already discussed with the 1st tech, Christopher, you should not
confuse the RFC2633 with the concept of digital signatures.

That RFC simply describes what S/MIME is and how it's implemented. As
you've
correctly stated, it does not apply to the email's headers, just as
it's
applications are not limited to emails. All it is is the definition
of how
S/MIME works.

The issue here is another. Digitally signed emails rely on multiple
standards to ensure the contents are not altered and to identify the
identity of the sender. Outlook just happens to use S/MIME for part
of this
purpose (the integrity of the content). But Outlook is failing to do
a
pretty major thing. It's not ensuring the identity of the sender!
That is
absolutely against what digitally signed emails are supposed to
prevent.
I've been able to change a digitally singned email, and make it
appear that
"hacker@logsat.com" sent it. Outlook did not complain and confirms
the email
is authentic.

Now if you say that behavior is by design, yes, it means there are no
bugs
since it's working as the programmers wanted. But then in this case
the
problem is even worse, as it was intentional. It's not a matter of
correcting the documentation, because you are now distributing a
product
that is not able to verify the sender of digitally signed signatures,
and
that sees "hacked" emails as valid. The Exchange scenarios you
mentioned are
*supposed* to fail, since the sender's email is not the one who
signed the
certificate.

We were looking at this technology for digitally signing court
documents in
Orange County. This has caused a grat drawback, as we have proven
that
digitally signing an email in no way authenticates the sender, which
is
*exactly* what we were looking in a digital signature.

As a side note, your statement "instead add the signed by line to the
mail
header which identifies the email address of the person who signed
the
message" is not very conforting. As you yourself said, S/MIME does
not check
email headers, and so I'm pretty sure I can modify the very same
header you
mention above to even more forge the email.

To summarize, please do not use RFC2633 as an excuse to justify
Outlook's
behavior, as digital signatures are more than S/MIME compliance.
Please
think about these implications very carefully, because I will have to
release and publicize my findings sooner or later, and I'm guessing
you
would really like to have a fix ready before this occurs.

Roberto

- -----Original Message-----
From: Microsoft Security Response Center
[mailto:secure@microsoft.com]
Sent: Friday, October 29, 2004 8:36 PM
To: roberto@logsat.com
Cc: Microsoft Security Response Center
Subject: RE: Security Vulnerability Report [5608lw]

Thanks Roberto,

On my way out for the weekend but I do have some data to share with
you.
The behavior you are seeing is actually the result of a by design
decision.

A warning about that the sender's address does not match the signer's
address would cause
a number false positives in many valid scenarios such a proxy
addresses. In,
for instance, Exchange scenarios it is often the case that the email
address
"user@company.com" may only be a proxy address for the real internal
address
of "user@department.company.com". So the
sender's address will be "user@company.com" but it will be signed
with
a cert that contains "user@department.company.com" rather.

As a result the design that was chosen was to not warn and instead
add the
signed by
line to the mail header which identifies the email address of the
person who
signed the message and the person receiving it should use the signed
by line
to tell who signed the message.

Now, I will ask them to look into this long term as well to see
whether we
should look at protecting the headers, as RFC 2633 doesn't speak to
that.

The product team is also looking at the documentation to make this
more
clear and I thank you for pointing this out.

Please let me know your thoughts here.

Have a good weekend.
/Lennart

- -----Original Message-----
From: Roberto Franceschetti [mailto:roberto@logsat.com]
Sent: Friday, October 29, 2004 5:07 PM
To: Microsoft Security Response Center
Subject: RE: Security Vulnerability Report [5608lw]

Lennart,

Since I have not heard anything for the whole week, this is to "ping"
you
for an update.

Thanks,

Roberto

- -----Original Message-----
From: Microsoft Security Response Center
[mailto:secure@microsoft.com]
Sent: Friday, October 22, 2004 6:17 PM
To: roberto@logsat.com
Cc: Microsoft Security Response Center
Subject: RE: Security Vulnerability Report [5608lw]

Hi Roberto,

The product team is looking at this now. I know they will be looking
at this
as well but could you perhaps tell me what behavior you have seen in
OE and
other mail readers?
Weekend is coming up here so I'll get back to you next week with more
but
please don not hesitate to ping me for status should you not hear
from me, I
intend to but just shoot me some mail if not.

Kind regards and have a good weekend
/Lennart

-----BEGIN PGP SIGNATURE-----
Version: PGP 8.1
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=Ljdn
-----END PGP SIGNATURE-----
 

 


The original emails between Microsoft and myself are available here:

To Microsoft: (not date-sorted):

Signatures/ToMicrosoft/RE Scope of signatures in signed email messages lw .msg

Signatures/ToMicrosoft/RE Security Vulnerability Report 5608lw (1).msg

Signatures/ToMicrosoft/RE Security Vulnerability Report 5608lw (2).msg

Signatures/ToMicrosoft/RE Security Vulnerability Report 5608lw (3).msg

Signatures/ToMicrosoft/RE Security Vulnerability Report 5608lw (4).msg

Signatures/ToMicrosoft/RE Security Vulnerability Report 5608lw (5).msg

Signatures/ToMicrosoft/RE Security Vulnerability Report 5608lw (6).msg

Signatures/ToMicrosoft/RE Security Vulnerability Report 5608lw .msg

Signatures/ToMicrosoft/RE Security Vulnerability Report (10).msg

Signatures/ToMicrosoft/RE Security Vulnerability Report (11).msg

Signatures/ToMicrosoft/RE Security Vulnerability Report (7).msg

Signatures/ToMicrosoft/RE Security Vulnerability Report (8).msg

Signatures/ToMicrosoft/RE Security Vulnerability Report (9).msg

Signatures/ToMicrosoft/RE Security Vulnerability Report.msg

Signatures/ToMicrosoft/Scope of signatures in signed email messages lw .msg

 

From Microsoft (not date-sorted):

Signatures/FromMicrosoft/RE Scope of signatures in signed email messages lw .msg

Signatures/FromMicrosoft/RE Security Vulnerability Report 5608lw (1).msg

Signatures/FromMicrosoft/RE Security Vulnerability Report 5608lw (2).msg

Signatures/FromMicrosoft/RE Security Vulnerability Report 5608lw (3).msg

Signatures/FromMicrosoft/RE Security Vulnerability Report 5608lw (4).msg

Signatures/FromMicrosoft/RE Security Vulnerability Report 5608lw (5).msg

Signatures/FromMicrosoft/RE Security Vulnerability Report 5608lw .msg

Signatures/FromMicrosoft/RE Security Vulnerability Report (6).msg

Signatures/FromMicrosoft/RE Security Vulnerability Report.msg

Signatures/FromMicrosoft/Scope of signatures in signed email messages lw .msg