Vulnerabilities > CVE-2005-0560 - Out-of-bounds Write vulnerability in Microsoft Exchange Server 2000/2003
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
Heap-based buffer overflow in the SvrAppendReceivedChunk function in xlsasink.dll in the SMTP service of Exchange Server 2000 and 2003 allows remote attackers to execute arbitrary code via a crafted X-LINK2STATE extended verb request to the SMTP port.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 2 |
Common Weakness Enumeration (CWE)
Exploit-Db
description | MS Exchange Server Remote Code Execution Exploit (MS05-021). CVE-2005-0560. Remote exploit for windows platform |
id | EDB-ID:947 |
last seen | 2016-01-31 |
modified | 2005-04-19 |
published | 2005-04-19 |
reporter | Evgeny Pinchuk |
source | https://www.exploit-db.com/download/947/ |
title | Microsoft Exchange Server Remote Code Execution Exploit MS05-021 |
Nessus
NASL family | Windows : Microsoft Bulletins |
NASL id | SMB_NT_MS05-021.NASL |
description | The remote host contains a flaw in its SMTP service that could allow remote code execution. Vulnerable services are Exchange 2003 (Windows 2000) and Exchange 2000. A public code is available to exploit this vulnerability. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 18024 |
published | 2005-04-12 |
reporter | This script is Copyright (C) 2005-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/18024 |
title | MS05-021: Vulnerability in SMTP Could Allow Remote Code Execution (894549) |
code |
|
Oval
accepted | 2005-06-22T12:38:00.000-04:00 | ||||
class | vulnerability | ||||
contributors |
| ||||
description | Heap-based buffer overflow in the SvrAppendReceivedChunk function in xlsasink.dll in the SMTP service of Exchange Server 2000 and 2003 allows remote attackers to execute arbitrary code via a crafted X-LINK2STATE extended verb request to the SMTP port. | ||||
family | windows | ||||
id | oval:org.mitre.oval:def:4032 | ||||
status | accepted | ||||
submitted | 2005-04-21T12:00:00.000-04:00 | ||||
title | Exchange Server SMTP Buffer Overflow | ||||
version | 2 |
Saint
bid | 13118 |
description | Microsoft Exchange X-LINK2STATE buffer overflow |
id | mail_smtp_exchangexl2s |
osvdb | 15467 |
title | exchange_x_link2state_bo |
type | remote |
Seebug
bulletinFamily | exploit |
description | <p><strong>漏洞描述:</strong></p><p>Microsoft Exchange是一款由微软开发的邮件服务程序。Microsoft Exchange Server中存在缓冲区溢出漏洞,攻击者可能利用此漏洞在主机上执行任意指令。 起因是Exchange SMTP Server在处理特殊的扩展SMTP verb时存在缓冲区溢出。漏洞可能允许攻击者连接到Exchange服务器的SMTP端口并发送精心构造的恶意命令,这些命令可能导致拒绝服务或以SMTP服务进程的权限运行攻击者所选择的代码。</p><p><strong>漏洞影响:</strong></p><p>受影响的软件:</p><p> •Microsoft Exchange Server 2000 Service Pack 3 </p><p>•Microsoft Exchange Server 2003 </p><p>•Microsoft Exchange Server 2003 Service Pack 1 </p><p>不受影响的软件:</p><p>•Microsoft Exchange Server 5.5 Service Pack 4</p><p>•Microsoft Exchange Server 5.0 Service Pack 2</p><p><strong>CVE-ID:CVE-2005-0560 </strong></p><p><strong>CNNVD-ID:CNNVD-200505-527</strong></p><p><strong>CNVD-ID:CNVD-2005-0869 </strong></p><p><strong>解决方案:</strong></p><p>Microsoft </p><p>--------- </p><p>Microsoft已经为此发布了一个安全公告(MS05-021)以及相应补丁:</p><p>MS05-021:Vulnerability in Exchange Server Could Allow Remote Code Execution (894549)链接:<a href="http://www.microsoft.com/technet/security/Bulletin/MS05-021.mspx">http://www.microsoft.com/technet/security/Bulletin/MS05-021.mspx</a></p><p>补丁下载:Microsoft Exchange 2000 Server Service Pack 3 - <a href="http://www.microsoft.com/downloads/details.aspx?FamilyId=2A2AF17E-2E4A-4479-8AC9-B5544EA0BD66">http://www.microsoft.com/downloads/details.aspx?FamilyId=2A2AF17E-2E4A-4479-8AC9-B5544EA0BD66</a> </p><p>Microsoft Exchange Server 2003 ?C </p><p> <a href="http://www.microsoft.com/downloads/details.aspx?FamilyId=97F409EB-C8D0-4C94-A67B-5945E26C9267">http://www.microsoft.com/downloads/details.aspx?FamilyId=97F409EB-C8D0-4C94-A67B-5945E26C9267</a> </p><p>Microsoft Exchange Server 2003 Service Pack ?C <a href="http://www.microsoft.com/downloads/details.aspx?FamilyId=35BCE74A-E84A-4035-BF18-196368F032CC">http://www.microsoft.com/downloads/details.aspx?FamilyId=35BCE74A-E84A-4035-BF18-196368F032CC</a></p> |
id | SSV:13682 |
last seen | 2017-11-19 |
modified | 2005-04-19 |
published | 2005-04-19 |
reporter | Root |
source | https://www.seebug.org/vuldb/ssvid-13682 |
title | MS Exchange Server Remote Code Execution Exploit (MS05-021) |
References
- http://secunia.com/advisories/14920/
- http://www.osvdb.org/displayvuln.php?osvdb_id=15467
- http://xforce.iss.net/xforce/alerts/id/193
- http://www.us-cert.gov/cas/techalerts/TA05-102A.html
- http://www.kb.cert.org/vuls/id/275193
- http://marc.info/?l=bugtraq&m=111393947713420&w=2
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4032
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-021