![]() |
|
ESB-2001.527 -- Microsoft Security Bulletin MS01-057 -- Specially Formed Script in HMTL Mail can Execute in Exchange 5.5 OWA |
|
Date: 07 December 2001 Original URL: http://www.auscert.org.au/render.html?cid=1&it=1637 References: ESB-2001.530 Click here for PGP verifiable version -----BEGIN PGP SIGNED MESSAGE-----
===========================================================================
AUSCERT External Security Bulletin Redistribution
ESB-2001.527 -- Microsoft Security Bulletin MS01-057
Specially Formed Script in HMTL Mail can Execute in Exchange 5.5 OWA
7 December 2001
===========================================================================
AusCERT Security Bulletin Summary
---------------------------------
Product: Microsoft Exchange 5.5 Server Outlook Web Access
Vendor: Microsoft
Impact: Execute Arbitrary Code/Commands
Access Required: Remote
- --------------------------BEGIN INCLUDED TEXT--------------------
- -----BEGIN PGP SIGNED MESSAGE-----
- - ----------------------------------------------------------------------
Title: Specially Formed Script in HMTL Mail can Execute in
Exchange 5.5 OWA
Date: 06 December 2001
Software: Microsoft Exchange 5.5 Server Outlook Web Access
Impact: Run Code of Attacker's Choice
Max Risk: Medium
Bulletin: MS01-057
Microsoft encourages customers to review the Security Bulletin at:
http://www.microsoft.com/technet/security/bulletin/MS01-057.asp.
- - ----------------------------------------------------------------------
Issue:
======
Outlook Web Access (OWA) is a service of Exchange 5.5 Server that
allows users to access and manipulate messages in their Exchange
mailbox by using a web browser.
A flaw exists in the way OWA handles inline script in messages in
conjunction with Internet Explorer (IE). If an HTML message that
contains specially formatted script is opened in OWA, the script
executes when the message is opened. Because OWA requires that
scripting be enabled in the zone where the OWA server is located,
a vulnerability results because this script could take any action
against the user's Exchange mailbox that the user himself was
capable of, including sending, moving, or deleting messages. An
attacker could maliciously exploit this flaw by sending a
specially crafted message to the user. If the user opened the
message in OWA, the script would then execute.
While it is possible for a script to send a message as the user,
it is impossible for the script to send a message to addresses in
the user's address book. Thus, the flaw cannot be exploited for
mass-mailing attacks. Also, mounting a successful attack requires
knowledge of the intended victim's choice of mail clients and
reading habits. If the maliciously crafted message were read in
any mail client other than a browser through OWA, the attack
would fail.
Mitigating Factors:
====================
- A successful attack would require the victim to read the message
in a IE using OWA only. The attack would fail if read in any
other mail client.
- A successful attack would also require knowledge of the version
of OWA in use. The attack would fail on other versions of OWA.
- A successful attack can only take action on the mailbox on the
Exchange Server as the user. It cannot take action on the user's
local machine. It cannot take actions on any other users mailbox
directly. Nor can it take actions directly on the Exchange Server.
Risk Rating:
============
- Internet systems: Moderate
- Intranet systems: Moderate
- Client systems: None
Patch Availability:
===================
- A patch is available to fix this vulnerability. Please read the
Security Bulletin at
http://www.microsoft.com/technet/security/bulletin/ms01-057.asp
for information on obtaining this patch.
Acknowledgment:
===============
- Lex Arquette of WhiteHat Security (http://www.whitehatsec.com)
- - ---------------------------------------------------------------------
THE INFORMATION PROVIDED IN THE MICROSOFT KNOWLEDGE BASE IS
PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND. MICROSOFT DISCLAIMS
ALL
WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING THE
WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.
IN NO EVENT
SHALL MICROSOFT CORPORATION OR ITS SUPPLIERS BE LIABLE FOR ANY
DAMAGES
WHATSOEVER INCLUDING DIRECT, INDIRECT, INCIDENTAL, CONSEQUENTIAL,
LOSS OF
BUSINESS PROFITS OR SPECIAL DAMAGES, EVEN IF MICROSOFT CORPORATION OR
ITS
SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. SOME
STATES DO
NOT ALLOW THE EXCLUSION OR LIMITATION OF LIABILITY FOR CONSEQUENTIAL
OR
INCIDENTAL DAMAGES SO THE FOREGOING LIMITATION MAY NOT APPLY.
- -----BEGIN PGP SIGNATURE-----
Version: PGP 7.1
iQEVAwUBPA/6iY0ZSRQxA/UrAQGilggAikP7XNxSWstX7sQ67uO5sqSKDhaY/CAz
Zb02lYKG9tztDRZ8uI+mpwYkdDLXvMDL3q7DsZAJO9x0IU0yJZ6/SE2gKaavQkmA
G03QoNwIKekVLbMvzMXq/HQIGooGCAPqBVGh3agD7kDUhs7JMr+t94Rx3gR659t/
jPm7IBlKLHk0PIebRxuqZS7JfnYsTIeFVhNFoMVWd9Dt6bUJQ17RkhDM7yuQI+ca
k5jku2BqD+TVpu7w+gmqvGqr7FB3WismKFeZJ8yjNBBuMkEwhflkccSff3OccB8o
a3/fSbFEaCXVoR05d7MejEdNnOJkeV9I1KsA5V/HVN855iVj+P943A==
=nxkT
- -----END PGP SIGNATURE-----
- --------------------------END INCLUDED TEXT--------------------
You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.
This security bulletin is provided as a service to AusCERT's members. As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to use any or all of this information is
the responsibility of each user or organisation, and should be done so in
accordance with site policies and procedures.
NOTE: This is only the original release of the security bulletin. It may
not be updated when updates to the original are made. If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the original authors to ensure that the information is still current.
Contact information for the authors of the original document is included
in the Security Bulletin above. If you have any questions or need further
information, please contact them directly.
Previous advisories and external security bulletins can be retrieved from:
http://www.auscert.org.au/Information/advisories.html
If you believe that your system has been compromised, contact AusCERT or
your representative in FIRST (Forum of Incident Response and Security
Teams).
Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for emergencies.
-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: noconv
Comment: ftp://ftp.auscert.org.au/pub/auscert/AUSCERT_PGP.key
iQCVAwUBPBCdwih9+71yA2DNAQG8DAP+Ps19vVAe8LXshfgbjvDHIxHHe4W5H8nc
i7M78g3bDo4PNoaftusPAKSl6a2eekybx2xxGQbaT2PS7spnCwTjKPeS58DMiXJM
uFUwJSpz0oaaaPOjjaS+qQr5cNv9jRO4g/APCiv7ffjXqtRMrYgUMTd9bZ9DQfEq
mDgtbOKCt0s=
=gILq
-----END PGP SIGNATURE-----
|