Microsoft Outlook allows an attacker to execute JavaScript code by using IFRAME tags to reference malicious Windows Media Player file

outlook-iframe-javascript (8604) The risk level is classified as HighHigh Risk


Microsoft Outlook could allow a remote attacker to execute JavaScript code using malicious Microsoft Windows Media Player files. A remote attacker using IFRAME tags in an HTML message can reference a malicious Windows Media Player file containing JavaScript code. When an Outlook user views the message, Outlook would start the Windows Media Player and the malicious code would be executed on the system.


Gain Privileges


No remedy available as of September 1, 2014.


  • BugTraq Mailing List, Thu Mar 21 2002 - 13:47:56 CST: How Outlook 2002 can still execute JavaScript in an HTML email message.
  • BID-4340: Microsoft Outlook IFrame Embedded Media Player File Vulnerability
  • CVE-2002-0481: An interaction between Windows Media Player (WMP) and Outlook 2002 allows remote attackers to bypass Outlook security settings and execute Javascript via an IFRAME in an HTML email message that references .WMS (Windows Media Skin) or other WMP media files, whose onload handlers execute the player.LaunchURL() Javascript function.
  • OSVDB ID: 11420: Microsoft Outlook WMP .wms File IFRAME Command Execution

Platforms Affected:

  • Microsoft Outlook 2002


Mar 21, 2002

The information within this database may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. In no event shall the author/distributor (IBM Internet Security Systems X-Force) be held liable for any damages whatsoever arising out of or in connection with the use or spread of this information.

For corrections or additions please email ignore thisxforceignore this@ignore thisus.ignore thisibm.comignore this

Return to the main page