Recently a new Microsoft Outlook vulnerability has been reported in the Internet. It is highly critical for the users of this email program and can be exploited by malicious people to compromise users’ systems.
This vulnerability is caused due to an error when handling a specially crafted "mailto:" URI (Uniform Resource Identifier) passed from a web browser. This can be exploited to pass extra command line switches to Outlook. Successful exploitation allows execution of arbitrary code when a user e.g. visits a malicious website.
By tradition, RITLabs reminds its clients that The Bat! benefits of a great variety of its own mechanisms of email processing. Thus, URI processing mechanism essentially differs from the one used by Microsoft Outlook. Therefore, The Bat! users should not be afraid that this problem affects them.
To find out more about this vulnerability click http://secunia.com/advisories/29320/