Vulnerabilities > CVE-2009-0098 - Resource Management Errors vulnerability in Microsoft Exchange Server 2000/2003/2007

047910
CVSS 9.3 - CRITICAL
Attack vector
NETWORK
Attack complexity
MEDIUM
Privileges required
NONE
Confidentiality impact
COMPLETE
Integrity impact
COMPLETE
Availability impact
COMPLETE
network
microsoft
CWE-399
critical
nessus

Summary

Microsoft Exchange 2000 Server SP3, Exchange Server 2003 SP2, and Exchange Server 2007 SP1 do not properly interpret Transport Neutral Encapsulation (TNEF) properties, which allows remote attackers to execute arbitrary code via a crafted TNEF message, aka "Memory Corruption Vulnerability."

Vulnerable Configurations

Part Description Count
Application
Microsoft
3

Common Weakness Enumeration (CWE)

Msbulletin

bulletin_idMS09-003
bulletin_url
date2009-02-10T00:00:00
impactRemote Code Execution
knowledgebase_id959239
knowledgebase_url
severityCritical
titleVulnerabilities in Microsoft Exchange Could Allow Remote Code Execution

Nessus

  • NASL familyWindows : Microsoft Bulletins
    NASL idSMB_NT_MS09-003.NASL
    descriptionThe remote host is running a version of Microsoft Exchange that is affected by a memory corruption vulnerability that could lead to remote code execution when processing a specially crafted TNEF message as well as a denial of service vulnerability when processing a specially crafted MAPI command that could cause the Microsoft Exchange System Attendant service and other services that use the EMSMDB32 provider to stop responding.
    last seen2020-06-01
    modified2020-06-02
    plugin id35631
    published2009-02-11
    reporterThis script is Copyright (C) 2009-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/35631
    titleMS09-003: Vulnerabilities in Microsoft Exchange Could Allow Remote Code Execution (959239)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(35631);
      script_version("1.27");
      script_cvs_date("Date: 2019/01/10 15:44:14");
    
      script_cve_id("CVE-2009-0098", "CVE-2009-0099");
      script_bugtraq_id(33134, 33136);
      script_xref(name:"MSFT", value:"MS09-003");
      script_xref(name:"MSKB", value:"959241");
      script_xref(name:"MSKB", value:"959897");
    
      script_name(english:"MS09-003: Vulnerabilities in Microsoft Exchange Could Allow Remote Code Execution (959239)");
      script_summary(english:"Determines the version of Exchange");
    
      script_set_attribute(attribute:"synopsis", value:
    "Arbitrary code can be executed on the remote host through the email
    server.");
      script_set_attribute(attribute:"description", value:
    "The remote host is running a version of Microsoft Exchange that is
    affected by a memory corruption vulnerability that could lead to
    remote code execution when processing a specially crafted TNEF message
    as well as a denial of service vulnerability when processing a
    specially crafted MAPI command that could cause the Microsoft Exchange
    System Attendant service and other services that use the EMSMDB32
    provider to stop responding.");
      script_set_attribute(attribute:"see_also", value:"https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2009/ms09-003");
      script_set_attribute(attribute:"solution", value:
    "Microsoft has released a set of patches for Exchange 2000, 2003, and
    2007.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"false");
      script_set_attribute(attribute:"exploited_by_malware", value:"true");
      script_cwe_id(20, 399);
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2009/02/10");
      script_set_attribute(attribute:"patch_publication_date", value:"2009/02/10");
      script_set_attribute(attribute:"plugin_publication_date", value:"2009/02/11");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:microsoft:windows");
      script_set_attribute(attribute:"cpe", value:"cpe:/a:microsoft:exchange_server");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_family(english:"Windows : Microsoft Bulletins");
    
      script_copyright(english:"This script is Copyright (C) 2009-2019 Tenable Network Security, Inc.");
    
      script_dependencies("smb_hotfixes.nasl", "ms_bulletin_checks_possible.nasl");
      script_require_keys("SMB/MS_Bulletin_Checks/Possible");
      script_require_ports(139, 445, 'Host/patch_management_checks');
    
      exit(0);
    }
    
    
    include("smb_func.inc");
    include("smb_hotfixes.inc");
    include("smb_hotfixes_fcheck.inc");
    
    
    include("misc_func.inc");
    get_kb_item_or_exit("SMB/MS_Bulletin_Checks/Possible");
    
    bulletin = 'MS09-003';
    kbs = make_list("959241", "959897");
    if (get_kb_item("Host/patch_management_checks")) hotfix_check_3rd_party(bulletin:bulletin, kbs:kbs, severity:SECURITY_HOLE);
    
    
    version = get_kb_item("SMB/Exchange/Version");
    if (!version) exit(0);
    
    
    # 2000
    if (version == 60)
    {
      sp = get_kb_item ("SMB/Exchange/SP");
      rootfile = get_kb_item("SMB/Exchange/Path");
      if (!rootfile || (sp && sp > 4)) exit(0);
    
      rootfile = rootfile + "\bin";
      if (hotfix_check_fversion(path:rootfile, file:"Emsmdb32.dll", version:"6.0.6620.9", bulletin:bulletin, kb:"959897") == HCF_OLDER) {
     set_kb_item(name:"SMB/Missing/MS09-003", value:TRUE);
     hotfix_security_hole();
     }
    
      hotfix_check_fversion_end();
    }
    # 2003
    else if (version == 65)
    {
      sp = get_kb_item ("SMB/Exchange/SP");
      rootfile = hotfix_get_commonfilesdir() + "\Microsoft Shared\CDO";
      if (!rootfile || (sp && sp > 2)) exit(0);
    
      if (hotfix_check_fversion(path:rootfile, file:"Cdoex.dll", version:"6.5.7654.12", bulletin:bulletin, kb:"959897") == HCF_OLDER) {
     set_kb_item(name:"SMB/Missing/MS09-003", value:TRUE);
     hotfix_security_hole();
     }
    
      hotfix_check_fversion_end();
    }
    # 2007
    else if (version == 80)
    {
      sp = get_kb_item ("SMB/Exchange/SP");
      rootfile = hotfix_get_commonfilesdir() + "\Microsoft Shared\CDO";
      if (!rootfile || (sp && sp > 1)) exit(0);
    
      if (
        hotfix_check_fversion(path:rootfile, file:"Cdoex.dll", version:"8.1.338.0", min_version:"8.1.0.0", bulletin:bulletin, kb:"959241") == HCF_OLDER ||
        hotfix_check_fversion(path:rootfile, file:"Cdoex.dll", version:"8.0.834.0", bulletin:bulletin, kb:"959241") == HCF_OLDER
      ) {
     set_kb_item(name:"SMB/Missing/MS09-003", value:TRUE);
     hotfix_security_hole();
     }
    
      hotfix_check_fversion_end();
    }
    
  • NASL familyWindows
    NASL idEXCHANGE_MS09-003.NASL
    descriptionThe remote host is running a version of Microsoft Exchange that is affected by a memory corruption vulnerability that could lead to remote code execution when processing a specially crafted TNEF message as well as a denial of service vulnerability when processing a specially crafted MAPI command that could cause the Microsoft Exchange System Attendant service and other services that use the EMSMDB32 provider to stop responding.
    last seen2020-06-01
    modified2020-06-02
    plugin id108799
    published2018-04-03
    reporterThis script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/108799
    titleMS09-003: Microsoft Exchange Remote Code Execution (959239) (Uncredentialed)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(108799);
      script_version("1.13");
      script_cvs_date("Date: 2019/11/08");
    
      script_cve_id("CVE-2009-0098", "CVE-2009-0099");
      script_bugtraq_id(33134, 33136);
      script_xref(name:"MSFT", value:"MS09-003");
      script_xref(name:"MSKB", value:"959241");
      script_xref(name:"MSKB", value:"959897");
    
      script_name(english:"MS09-003: Microsoft Exchange Remote Code Execution (959239) (Uncredentialed)");
      script_summary(english:"Checks the version of Exchange");
    
      script_set_attribute(attribute:"synopsis", value:
    "Arbitrary code can be executed on the remote host through the email
    server.");
      script_set_attribute(attribute:"description", value:
    "The remote host is running a version of Microsoft Exchange that is
    affected by a memory corruption vulnerability that could lead to
    remote code execution when processing a specially crafted TNEF message
    as well as a denial of service vulnerability when processing a
    specially crafted MAPI command that could cause the Microsoft Exchange
    System Attendant service and other services that use the EMSMDB32
    provider to stop responding.");
      # https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2009/ms09-003
      script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?20f7b688");
      script_set_attribute(attribute:"solution", value:
    "Microsoft has released a set of patches for Exchange 2000, 2003, and
    2007.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C");
      script_set_cvss_temporal_vector("CVSS2#E:H/RL:OF/RC:C");
      script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H");
      script_set_cvss3_temporal_vector("CVSS:3.0/E:H/RL:O/RC:C");
      script_set_attribute(attribute:"cvss_score_source", value:"CVE-2009-0098");
    
      script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"true");
      script_set_attribute(attribute:"exploited_by_malware", value:"true");
      script_cwe_id(20, 399);
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2009/02/10");
      script_set_attribute(attribute:"patch_publication_date", value:"2009/02/10");
      script_set_attribute(attribute:"plugin_publication_date", value:"2018/04/03");
    
      script_set_attribute(attribute:"plugin_type", value:"remote");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:microsoft:windows");
      script_set_attribute(attribute:"cpe", value:"cpe:/a:microsoft:exchange_server");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_family(english:"Windows");
    
      script_copyright(english:"This script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
    
      script_dependencies("exchange_detect.nbin");
      script_require_keys("installed_sw/Exchange Server");
      script_require_ports("Services/smtp", 25, "Services/pop3", 143, "Services/www", 80);
    
      exit(0);
    }
    
    include("audit.inc");
    include("global_settings.inc");
    include("misc_func.inc");
    include("http.inc");
    include("vcf.inc");
    
    appname = 'Exchange Server';
    get_install_count(app_name:appname, exit_if_zero:TRUE);
    
    smtp_ports = get_kb_list("Services/smtp");
    pop3_ports = get_kb_list("Services/pop3");
    http_ports = get_kb_list("Services/www");
    
    ports = make_list(smtp_ports, pop3_ports, http_ports);
    port = branch(ports);
    app_info = vcf::get_app_info(app:appname, port:port, service:TRUE);
    
    vcf::check_granularity(app_info:app_info, sig_segments:3);
    
    constraints = [
      {"min_version" : "6.0.0", "fixed_version":"6.0.6620.9"},
      {"min_version" : "6.5.0", "fixed_version":"6.5.7654.4"},
      {"min_version" : "8.0.0", "fixed_version":"8.1.340.1"} # do SP0 & SP1 combined
    ];
    vcf::check_version_and_report(app_info:app_info, constraints:constraints, severity:SECURITY_HOLE);
    

Oval

accepted2014-06-23T04:07:47.483-04:00
classvulnerability
contributors
  • nameDragos Prisaca
    organizationGideon Technologies, Inc.
  • nameDragos Prisaca
    organizationGideon Technologies, Inc.
  • nameTodd Dolinsky
    organizationHewlett-Packard
  • nameTodd Dolinsky
    organizationHewlett-Packard
  • nameJonathan Baker
    organizationThe MITRE Corporation
  • nameShane Shaffer
    organizationG2, Inc.
  • nameMaria Kedovskaya
    organizationALTX-SOFT
  • nameJerome Athias
    organizationMcAfee, Inc.
definition_extensions
  • commentMicrosoft Exchange Server 2000 Service Pack 3 is installed
    ovaloval:org.mitre.oval:def:1858
  • commentMicrosoft Exchange Server 2003 Service Pack 2 is installed
    ovaloval:org.mitre.oval:def:1869
  • commentMicrosoft Exchange Server 2007 SP1 is installed
    ovaloval:org.mitre.oval:def:5577
descriptionMicrosoft Exchange 2000 Server SP3, Exchange Server 2003 SP2, and Exchange Server 2007 SP1 do not properly interpret Transport Neutral Encapsulation (TNEF) properties, which allows remote attackers to execute arbitrary code via a crafted TNEF message, aka "Memory Corruption Vulnerability."
familywindows
idoval:org.mitre.oval:def:6114
statusaccepted
submitted2009-02-10T16:00:00
titleMemory Corruption Vulnerability
version16

Seebug

bulletinFamilyexploit
descriptionBUGTRAQ ID: 33134 CVE(CAN) ID: CVE-2009-0098 Microsoft Exchange Server是一款企业级的邮件服务程序。 Microsoft Exchange Server解码消息的传输中性封装格式(TNEF)数据时存在内存破坏漏洞。如果用户预览了以TNEF格式发送的特制邮件消息,或Microsoft Exchange Server Information Store处理了特制的邮件消息,就可以触发这个漏洞,导致执行任意代码。 Microsoft Exchange Server 2007 SP1 Microsoft Exchange Server 2003 SP2 Microsoft Exchange Server 2000 SP3 厂商补丁: Microsoft --------- Microsoft已经为此发布了一个安全公告(MS09-003)以及相应补丁: MS09-003:Vulnerabilities in Microsoft Exchange Could Allow Remote Code Execution (959239) 链接:<a href=http://www.microsoft.com/technet/security/Bulletin/MS09-003.mspx?pf=true target=_blank rel=external nofollow>http://www.microsoft.com/technet/security/Bulletin/MS09-003.mspx?pf=true</a>
idSSV:4745
last seen2017-11-19
modified2009-02-13
published2009-02-13
reporterRoot
titleExchange Server TNEF解码内存破坏漏洞(MS09-003)