أستغفر الله العظيم ... سبحان الله وبحمده



العودة   منتديات داماس > برامج الكمبيوتر والانترنت > برامج


مواضيع مميزة  


آخر عشرة مواضيع المواضيع النشطة


02-02-2004, 10:31 PM
gala غير متصل
عضو فعال
رقم العضوية: 338
تاريخ التسجيل: Jun 2003
المشاركات: 113
إعجاب: 2
تلقى 6 إعجاب على 2 مشاركة
تلقى دعوات الى: 0 موضوع
    #1  

تحذير !! تحذير !! تحذير !!


Microsoft Exchange Server 2003 Outlook Web Access Random Mailbox Access
Vulnerability
Bugtraq ID 9409
CVE CAN-2003-0904
Published Jan 13 2004
Last Update 2/2/2004 7:09:26 PM GMT
Remote Yes
Local No
Credibility Vendor Confirmed
Classification Access Validation Error
Ease No Exploit Required
Availability Circumstantial
Authentication Required

Impact 8 Severity 7 Urgency Rating 8.1

Last Change Updated solutions text and revised security bulletin
available.

Vulnerable Systems
- ------------------
Microsoft Exchange Server 2003

Non-Vulnerable Systems
- ----------------------
Microsoft Exchange Server 5.5.0
Microsoft Exchange Server 5.5.0 SP1
Microsoft Exchange Server 5.5.0 SP2
Microsoft Exchange Server 5.5.0 SP3
Microsoft Exchange Server 5.5.0 SP4
Microsoft Exchange Server 2000
Microsoft Exchange Server 2000 SP1
Microsoft Exchange Server 2000 SP2
Microsoft Exchange Server 2000 SP3

Short Summary
- -------------
Exchange server contains a vulnerability that could allow an
authenticated user to connect to another user's OWA mailbox.

Impact
- ------
An authenticated OWA user can access another OWA user's mailbox,
allowing access to potentially sensitive information.

Technical Description
- ---------------------
Microsoft Exchange Server 2003 is an e-mail and directory server offered
by Microsoft. Outlook Web Access (OWA) is a service provided by Exchange
server that allows users to access their Exchange mailbox via the web.

A vulnerability exists that could allow an authenticated OWA user to
connect to another OWA user's mailbox. Only mailboxes recently accessed
through OWA on the same Exchange server could be accessed in this way.
An attacker could not choose which mailbox to connect to; the connection
would be random.

The vulnerability only exists when the back-end Exchange server hosting
the OWA mailboxes is configured not to use Kerberos authentication with
the front-end Exchange server running on the IIS server. In this case,
authentication would fall back to NTLM authentication. The only method
for exposing the vulnerability in this way without intervention by an
administrator would be through the weakness described in BID 9118.

When these circumstances occur, the front-end Exchange server will
periodically attempt to authenticate with the back-end server using
Kerberos authentication. On these requests, IIS 6 will ignore the
Kerberos authentication and allow access to the open connections that
were already authenticated with NTLM.

Successful exploitation of this vulnerability could allow a remote
attacker to access sensitive information in another user's mailbox or
send email as that user.

Attack Scenarios
- ----------------
An attacker would first have to gain authentication credentials on an
OWA system in order to exploit this vulnerability. The Exchange back-end
server hosting the OWA mailboxes would also have to be configured not to
use Kerberos authentication.

The attacker attempts to connect to the mailbox using OWA. When the
front-end server attempts to authenticate with the back-end server using
Kerberos authentication, the authentication fails since the back-end is
not configured to use Kerberos. The front-end server then reuses an HTTP
connection previously authenticated using NTLM.

This allows the attacker to connect to a mailbox that was recently
accessed using the OWA server.

Exploits
- --------
There is no exploit code required.


Mitigating Strategies
- ---------------------
Block external access at the network boundary, unless service is
required by external parties.
Do not allow OWA access to unknown or untrusted users. If possible,
limit access to trusted hosts and networks.


Solutions
- ---------
Workaround
Disabling HTTP connection reuse on the Exchange front-end server is an
effective workaround for this vulnerability. A slight performance
degradation may result from this workaround. For details on disabling
this feature, see How to Disable HTTP Connection Reuse on a Microsoft
Exchange Server 2003 Front-End Server in the References section.

Microsoft has released an update to address this issue. Microsoft has
reported that this security update cannot be detected by MBSA 1.1.1. As a
result of this, SMS 2.0 Software Update Services Feature Pack and SMS 2.0
Administration Feature Pack's Elevated Rights Deployment Tool cannot be
used for this security update.



Microsoft Patch Security Update for Exchange 2003 (KB832759)

http://www.microsoft.com/downloads/d...42F949-D09B-41
99-A837-FBCFC0567676&displaylang=en
Microsoft Exchange Server 2003

Credit
- ------
Announced by the vendor.

References
- ----------
Web Page:Microsoft Security Bulletin MS04-002 (Microsoft) Microsoft

http://www.microsoft.com/technet/tre...technet/securi
ty/bulletin/MS04-002.asp
--------------------------------------------------------
تحذير تحذير تحذير تحذير تحذير تحذير

aaah !!! @_@ to many things to eXplore ,,, oh well , as much as you give as much as you get.. that's what i always say





المواضيع المشابهه
الموضوع كاتب الموضوع المنتدى مشاركات آخر مشاركة
تحذير هام لكل بنت alfares s صور - طرائف - الغاز - مسابقات - تسالي - مرح - نكت - فوازير 7 29-01-2013 12:31 PM
تحذير " من برنامج عربي يسمى InSpeak به ملفات تجسس " تحذير فاعل خيـر صيانة الكمبيوتر وحلول الحاسب الألي - هاردوير 10 23-08-2008 03:17 PM
تحذير تحذير تحذير لكل المسلمين من برنامج Download accelerator الرجاء الدخول للاهمية chenwi برامج 12 23-06-2008 02:59 PM
تحذير هام جدآ moh_abohabeba برامج 30 19-01-2005 07:55 PM
تحذير تحذير ..!! alsahernet المنتدى العام 3 14-06-2004 06:26 PM
 


تحذير !! تحذير !! تحذير !!

English

Powered by vBulletin® Version
Copyright ©2000 - 2017, Jelsoft Enterprises Ltd.
The owner and operator of the site is not responsible for the availability of, or any content provided.
Topics that are written in the site reflect the opinion of the author.
جميع ما يُطرح من مواضيع ومشاركات تعبر عن رأي كاتبها ولا تعبر عن رأي مالك الموقع أو الإدارة بأي حال من الأحوال.