Vulnerabilities > CVE-2007-0221 - Integer Overflow OR Wraparound vulnerability in Microsoft Exchange Server 2000
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
NONE Integrity impact
NONE Availability impact
COMPLETE Summary
Integer overflow in the IMAP (IMAP4) support in Microsoft Exchange Server 2000 SP3 allows remote attackers to cause a denial of service (service hang) via crafted literals in an IMAP command, aka the "IMAP Literal Processing Vulnerability."
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 |
Common Weakness Enumeration (CWE)
Common Attack Pattern Enumeration and Classification (CAPEC)
- Forced Integer Overflow This attack forces an integer variable to go out of range. The integer variable is often used as an offset such as size of memory allocation or similarly. The attacker would typically control the value of such variable and try to get it out of range. For instance the integer in question is incremented past the maximum possible value, it may wrap to become a very small, or negative number, therefore providing a very incorrect value which can lead to unexpected behavior. At worst the attacker can execute arbitrary code.
Nessus
NASL family | Windows : Microsoft Bulletins |
NASL id | SMB_NT_MS07-026.NASL |
description | The remote host is running a version of exchange that is vulnerable to a bug in the iCal attachment and MIME decoding routines, as well as in the IMAP literal processing and in OWA. These vulnerabilities could allow an attacker execute arbitrary code on the remote host. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 25165 |
published | 2007-05-08 |
reporter | This script is Copyright (C) 2006-2019 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/25165 |
title | MS07-026: Vulnerability in Microsoft Exchange Could Allow Remote Code Execution (931832) |
Oval
accepted | 2008-05-05T04:00:16.603-04:00 | ||||||||
class | vulnerability | ||||||||
contributors |
| ||||||||
definition_extensions |
| ||||||||
description | Integer overflow in the IMAP (IMAP4) support in Microsoft Exchange Server 2000 SP3 allows remote attackers to cause a denial of service (service hang) via crafted literals in an IMAP command, aka the "IMAP Literal Processing Vulnerability." | ||||||||
family | windows | ||||||||
id | oval:org.mitre.oval:def:2054 | ||||||||
status | accepted | ||||||||
submitted | 2007-05-09T10:04:48 | ||||||||
title | IMAP Literal Processing Vulnerability | ||||||||
version | 7 |
References
- http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=526
- http://secunia.com/advisories/25183
- http://www.osvdb.org/34392
- http://www.securityfocus.com/archive/1/468871/100/200/threaded
- http://www.securityfocus.com/bid/23810
- http://www.securitytracker.com/id?1018015
- http://www.us-cert.gov/cas/techalerts/TA07-128A.html
- http://www.vupen.com/english/advisories/2007/1711
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-026
- https://exchange.xforce.ibmcloud.com/vulnerabilities/33890
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2054