VID |
26203 |
Severity |
30 |
Port |
139,445 |
Protocol |
TCP |
Class |
SMB |
Detailed Description |
The hotfix (912442) for 'Script Injection Vulnerability in Microsoft Exchange' has not been applied. Microsoft Exchange Server 2000 with the Exchange 2000 Post-Service Pack 3 Update Rollup of August 2004 (870540) and Microsoft Exchange Server 2003 SP1 and SP2 could allow a remote attacker to execute arbitrary HTML or web script, caused by an input validation error in input validation errors in the Outlook Web Access (OWA) service. Microsoft Outlook Web Access (OWA) is a service of Exchange Server. OWA allows authorized users to read and send email, manage their calendar, and perform other functions on an Exchange server via the Web. OWA fails to correctly filter script contained in an email message under certain circumstances. This results in a vulnerability that could allow an attacker to supply script that would be executed by a user using OWA to read email. A remote attacker with the ability to supply an email message containing specially crafted script may be able to execute the script in the security context of the victim user on the client system.
* Note: This check requires an account with Guest or upper privileges which can access the registry of the remote host to scan. Absence of these condition will result in the check not being performed and a False Negative for all vulnerable hosts.
* References: http://www.microsoft.com/technet/security/bulletin/ms06-029.mspx http://www.kb.cert.org/vuls/id/138188 http://www.us-cert.gov/cas/techalerts/TA06-164A.html http://www.frsirt.com/english/advisories/2006/2326 http://www.sec-consult.com/fileadmin/Advisories/20060613-0_owa_xss_noexploit.txt http://securitytracker.com/id?1016280 http://secunia.com/advisories/20634
* Platforms Affected: Microsoft Exchange 2000 Server SP3 Microsoft Exchange Server 2003 SP1 Microsoft Exchange Server 2003 SP2 Microsoft Windows Any version |
Recommendation |
Apply the appropriate patch (912442) for your system, as listed in Microsoft Security Bulletin MS06-029 at http://www.microsoft.com/technet/security/bulletin/ms06-029.mspx
-- OR --
Patches for Windows platforms are also available from the Microsoft Windows Update Web site at http://windowsupdate.microsoft.com . Windows Update detects what version of Windows you are running and offers the appropriate patch. |
Related URL |
CVE-2006-1193 (CVE) |
Related URL |
18381 (SecurityFocus) |
Related URL |
25550,26166 (ISS) |
|