Korean
<< Back
VID 26203
Severity 30
Port 139,445
Protocol TCP
Class SMB
Detailed Description The hotfix (912442) for 'Script Injection Vulnerability in Microsoft Exchange' has not been applied. Microsoft Exchange Server 2000 with the Exchange 2000 Post-Service Pack 3 Update Rollup of August 2004 (870540) and Microsoft Exchange Server 2003 SP1 and SP2 could allow a remote attacker to execute arbitrary HTML or web script, caused by an input validation error in input validation errors in the Outlook Web Access (OWA) service. Microsoft Outlook Web Access (OWA) is a service of Exchange Server. OWA allows authorized users to read and send email, manage their calendar, and perform other functions on an Exchange server via the Web. OWA fails to correctly filter script contained in an email message under certain circumstances. This results in a vulnerability that could allow an attacker to supply script that would be executed by a user using OWA to read email. A remote attacker with the ability to supply an email message containing specially crafted script may be able to execute the script in the security context of the victim user on the client system.

* Note: This check requires an account with Guest or upper privileges which can access the registry of the remote host to scan. Absence of these condition will result in the check not being performed and a False Negative for all vulnerable hosts.

* References:
http://www.microsoft.com/technet/security/bulletin/ms06-029.mspx
http://www.kb.cert.org/vuls/id/138188
http://www.us-cert.gov/cas/techalerts/TA06-164A.html
http://www.frsirt.com/english/advisories/2006/2326
http://www.sec-consult.com/fileadmin/Advisories/20060613-0_owa_xss_noexploit.txt
http://securitytracker.com/id?1016280
http://secunia.com/advisories/20634

* Platforms Affected:
Microsoft Exchange 2000 Server SP3
Microsoft Exchange Server 2003 SP1
Microsoft Exchange Server 2003 SP2
Microsoft Windows Any version
Recommendation Apply the appropriate patch (912442) for your system, as listed in Microsoft Security Bulletin MS06-029 at http://www.microsoft.com/technet/security/bulletin/ms06-029.mspx

-- OR --

Patches for Windows platforms are also available from the Microsoft Windows Update Web site at http://windowsupdate.microsoft.com . Windows Update detects what version of Windows you are running and offers the appropriate patch.
Related URL CVE-2006-1193 (CVE)
Related URL 18381 (SecurityFocus)
Related URL 25550,26166 (ISS)