CVE-2008-3068
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
07/07/2008
Last modified:
09/04/2025
Description
Microsoft Crypto API 5.131.2600.2180 through 6.0, as used in Outlook, Windows Live Mail, and Office 2007, performs Certificate Revocation List (CRL) checks by using an arbitrary URL from a certificate embedded in a (1) S/MIME e-mail message or (2) signed document, which allows remote attackers to obtain reading times and IP addresses of recipients, and port-scan results, via a crafted certificate with an Authority Information Access (AIA) extension.
Impact
Base Score 2.0
7.50
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:microsoft:access:2007:*:*:*:*:*:*:* | ||
| cpe:2.3:a:microsoft:excel:2003:*:*:*:*:*:*:* | ||
| cpe:2.3:a:microsoft:excel:2007:*:*:*:*:*:*:* | ||
| cpe:2.3:a:microsoft:frontpage:2003:*:*:*:*:*:*:* | ||
| cpe:2.3:a:microsoft:groove:2007:*:*:*:*:*:*:* | ||
| cpe:2.3:a:microsoft:infopath:2003:*:*:*:*:*:*:* | ||
| cpe:2.3:a:microsoft:infopath:2007:*:*:*:*:*:*:* | ||
| cpe:2.3:a:microsoft:office:2007:*:*:*:*:*:*:* | ||
| cpe:2.3:a:microsoft:office:2007:sp1:*:*:*:*:*:* | ||
| cpe:2.3:a:microsoft:office_communicator:2007:*:*:*:*:*:*:* | ||
| cpe:2.3:a:microsoft:onenote:2003:*:*:*:*:*:*:* | ||
| cpe:2.3:a:microsoft:outlook:2003:*:*:*:*:*:*:* | ||
| cpe:2.3:a:microsoft:outlook:2007:*:*:*:*:*:*:* | ||
| cpe:2.3:a:microsoft:powerpoint:2003:*:*:*:*:*:*:* | ||
| cpe:2.3:a:microsoft:powerpoint:2007:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://securityreason.com/securityalert/3978
- http://www.securityfocus.com/archive/1/493947/100/0/threaded
- http://www.securityfocus.com/archive/1/494101/100/0/threaded
- http://www.securityfocus.com/bid/28548
- http://www.securitytracker.com/id?1019736=
- http://www.securitytracker.com/id?1019737=
- http://www.securitytracker.com/id?1019738=
- https://www.cynops.de/advisories/AKLINK-SA-2008-002.txt
- https://www.cynops.de/advisories/AKLINK-SA-2008-003.txt
- https://www.cynops.de/advisories/AKLINK-SA-2008-004.txt
- https://www.cynops.de/techzone/http_over_x509.html
- https://www.klink.name/security/aklink-sa-2008-002-outlook-smime.txt
- https://www.klink.name/security/aklink-sa-2008-003-live-mail-smime.txt
- https://www.klink.name/security/aklink-sa-2008-004-office2007-signatures.txt
- http://securityreason.com/securityalert/3978
- http://www.securityfocus.com/archive/1/493947/100/0/threaded
- http://www.securityfocus.com/archive/1/494101/100/0/threaded
- http://www.securityfocus.com/bid/28548
- http://www.securitytracker.com/id?1019736=
- http://www.securitytracker.com/id?1019737=
- http://www.securitytracker.com/id?1019738=
- https://www.cynops.de/advisories/AKLINK-SA-2008-002.txt
- https://www.cynops.de/advisories/AKLINK-SA-2008-003.txt
- https://www.cynops.de/advisories/AKLINK-SA-2008-004.txt
- https://www.cynops.de/techzone/http_over_x509.html
- https://www.klink.name/security/aklink-sa-2008-002-outlook-smime.txt
- https://www.klink.name/security/aklink-sa-2008-003-live-mail-smime.txt
- https://www.klink.name/security/aklink-sa-2008-004-office2007-signatures.txt



