Lucene search

K
saintSAINT CorporationSAINT:D63D5D94334D0CEEED8455B5102306AE
HistoryJan 13, 2006 - 12:00 a.m.

Microsoft Exchange X-LINK2STATE buffer overflow

2006-01-1300:00:00
SAINT Corporation
download.saintcorporation.com
28

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.719 High

EPSS

Percentile

97.7%

Added: 01/13/2006
CVE: CVE-2005-0560
BID: 13118
OSVDB: 15467

Background

Microsoft Exchange is an e-mail server for Microsoft Windows operating systems.

Problem

A buffer overflow condition in the handling of the X-LINK2STATE extended verb could allow a remote attacker to execute arbitrary commands.

Resolution

Install the patch referenced in Microsoft Security Bulletin 05-021.

References

<http://www.microsoft.com/technet/security/bulletin/ms05-021.mspx&gt;

Limitations

Exploit works on Exchange 2000 SP3. Unauthenticated exploitation is not possible against Windows Server 2003. Since this is a heap-based buffer overflow, exploit may not be reliable. Automated penetration test might not be able to pick the correct Exchange target type since there is no way to determine it remotely.

Platforms

Windows 2000

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.719 High

EPSS

Percentile

97.7%

Related for SAINT:D63D5D94334D0CEEED8455B5102306AE