CVE-2004-0840
CVSS10.0
发布时间 :2004-11-03 00:00:00
修订时间 :2008-09-10 15:28:01
NMCOPS    

[原文]The SMTP (Simple Mail Transfer Protocol) component of Microsoft Windows XP 64-bit Edition, Windows Server 2003, Windows Server 2003 64-bit Edition, and the Exchange Routing Engine component of Exchange Server 2003, allows remote attackers to execute arbitrary code via a malicious DNS response message containing length values that are not properly validated.


[CNNVD]Microsoft SMTP远程任意指令漏洞(MS04-035)(CNNVD-200411-026)

        
        Microsoft SMTP组件用于对邮件服务器的支持。
        Microsoft SMTP组件在处理DNS查询时存在问题,远程攻击者可以利用这个漏洞以系统进程权限在系统上执行任意指令。
        问题存在于Windows Server 2003 SMTP组件,当处理DNS查询时存在安全问题,攻击者利用这个漏洞可使服务处理特殊的DNS应答而触发远程任意指令执行。攻击者成功利用此漏洞可控制整个系统。漏洞也存在于安装了Microsoft Exchange Server 2003路由组件的Microsoft Windows 2000 Service Pack 3或Microsoft Windows 2000 Service Pack 4系统。
        

- CVSS (基础分值)

CVSS分值: 10 [严重(HIGH)]
机密性影响: COMPLETE [完全的信息泄露导致所有系统文件暴露]
完整性影响: COMPLETE [系统完整性可被完全破坏]
可用性影响: COMPLETE [可能导致系统完全宕机]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/o:microsoft:windows_2003_server:r2
cpe:/o:microsoft:windows_2003_server:64-bit
cpe:/o:microsoft:windows_xp:::64-bit
cpe:/a:microsoft:exchange_server:2003Microsoft exchange_srv 2003

- OVAL (用于检测的技术细节)

oval:org.mitre.oval:def:5509Exchange Server 2003 Routing Engine Buffer Overflow
oval:org.mitre.oval:def:3460Exchange Server 2003 (Windows Server 2003, 64-Bit Edition) Routing Engine Buffer Overflow
oval:org.mitre.oval:def:2300Exchange Server 2003 (INTERIM) Routing Engine Buffer Overflow
*OVAL详细的描述了检测该漏洞的方法,你可以从相关的OVAL定义中找到更多检测该漏洞的技术细节。

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0840
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2004-0840
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200411-026
(官方数据源) CNNVD

- 其它链接及资源

http://www.kb.cert.org/vuls/id/394792
(VENDOR_ADVISORY)  CERT-VN  VU#394792
http://xforce.iss.net/xforce/xfdb/17660
(VENDOR_ADVISORY)  XF  win-ms04035-patch(17660)
http://xforce.iss.net/xforce/xfdb/17621
(VENDOR_ADVISORY)  XF  win2k3-smtp-execute-code(17621)
http://www.microsoft.com/technet/security/bulletin/ms04-035.asp
(VENDOR_ADVISORY)  MS  MS04-035
http://www.securityfocus.com/bid/11374
(UNKNOWN)  BID  11374

- 漏洞信息

Microsoft SMTP远程任意指令漏洞(MS04-035)
危急 边界条件错误
2004-11-03 00:00:00 2005-10-20 00:00:00
远程  
        
        Microsoft SMTP组件用于对邮件服务器的支持。
        Microsoft SMTP组件在处理DNS查询时存在问题,远程攻击者可以利用这个漏洞以系统进程权限在系统上执行任意指令。
        问题存在于Windows Server 2003 SMTP组件,当处理DNS查询时存在安全问题,攻击者利用这个漏洞可使服务处理特殊的DNS应答而触发远程任意指令执行。攻击者成功利用此漏洞可控制整个系统。漏洞也存在于安装了Microsoft Exchange Server 2003路由组件的Microsoft Windows 2000 Service Pack 3或Microsoft Windows 2000 Service Pack 4系统。
        

- 公告与补丁

        厂商补丁:
        Microsoft
        ---------
        Microsoft已经为此发布了一个安全公告(MS04-035)以及相应补丁:
        MS04-035:Vulnerability in SMTP Could Allow Remote Code Execution (885881)
        链接:
        http://www.microsoft.com/technet/security/bulletin/MS04-035.mspx

        补丁下载:
        Microsoft Windows XP 64-Bit Edition Version 2003
        
        http://www.microsoft.com/downloads/details.aspx?FamilyId=b53e890d-7d6a-4bb4-8e28-15d661014288

        
        Microsoft Windows Server 2003
        
        http://www.microsoft.com/downloads/details.aspx?FamilyId=d7767455-1ca0-49ea-8f71-76da5d451a07

        
        Microsoft Windows Server 2003 64-Bit Edition
        
        http://www.microsoft.com/downloads/details.aspx?FamilyId=b53e890d-7d6a-4bb4-8e28-15d661014288

        Microsoft Exchange Server 2003 when installed on Microsoft Windows 2000 Service Pack 3 or Microsoft Windows 2000 Service Pack 4
        
        http://www.microsoft.com/downloads/details.aspx?FamilyId=313BEC77-0845-46D4-BB43-06C792ADB2EA

- 漏洞信息 (F34704)

ms04-035.html (PacketStormID:F34704)
2004-10-24 00:00:00
 
advisory
windows
CVE-2004-0840
[点击下载]

Microsoft Security Advisory MS04-035 - An attacker who successfully exploited an SMTP vulnerability in Windows could take complete control of an affected system, including installing programs; viewing, changing, or deleting data; or creating new accounts that have full privileges.

- 漏洞信息

10696
Microsoft Windows/Exchange SMTP DNS Lookup Overflow
Remote / Network Access Input Manipulation
Loss of Integrity Patch / RCS
Exploit Unknown Vendor Verified

- 漏洞描述

A remote overflow exists in Windows and Exchange. The SMTP component fails to validate DNS response data resulting in a buffer overflow. With a specially crafted request, an attacker can cause arbitrary code execution resulting in a loss of integrity.

- 时间线

2004-10-12 Unknow
Unknow Unknow

- 解决方案

Currently, there are no known workarounds or upgrades to correct this issue. However, Microsoft has released a patch to address this vulnerability.

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

Microsoft SMTP Service and Exchange Routing Engine Buffer Overflow Vulnerability
Boundary Condition Error 11374
Yes No
2004-10-12 12:00:00 2009-07-12 07:06:00
This vulnerability was announced by Microsoft.

- 受影响的程序版本

Microsoft Windows XP 64-bit Edition Version 2003 SP1
Microsoft Windows XP 64-bit Edition Version 2003
Microsoft Windows Server 2003 Web Edition
Microsoft Windows Server 2003 Standard Edition
Microsoft Windows Server 2003 Enterprise Edition Itanium 0
Microsoft Windows Server 2003 Enterprise Edition
Microsoft Windows Server 2003 Datacenter Edition Itanium 0
Microsoft Windows Server 2003 Datacenter Edition
Microsoft Exchange Server 2003 SP1
Microsoft Exchange Server 2003
Microsoft Exchange Server 2000 SP3
Microsoft Exchange Server 2000 SP2
- Microsoft Windows 2000 Advanced Server SP2
- Microsoft Windows 2000 Advanced Server SP1
- Microsoft Windows 2000 Advanced Server
- Microsoft Windows 2000 Datacenter Server SP2
- Microsoft Windows 2000 Datacenter Server SP1
- Microsoft Windows 2000 Datacenter Server
- Microsoft Windows 2000 Server SP2
- Microsoft Windows 2000 Server SP1
- Microsoft Windows 2000 Server
Microsoft Exchange Server 2000 SP1
- Microsoft Windows 2000 Advanced Server SP2
- Microsoft Windows 2000 Advanced Server SP1
- Microsoft Windows 2000 Advanced Server
- Microsoft Windows 2000 Datacenter Server SP2
- Microsoft Windows 2000 Datacenter Server SP1
- Microsoft Windows 2000 Datacenter Server
- Microsoft Windows 2000 Server SP2
- Microsoft Windows 2000 Server SP1
- Microsoft Windows 2000 Server
Microsoft Exchange Server 2000
- Microsoft Windows 2000 Advanced Server SP2
- Microsoft Windows 2000 Advanced Server SP1
- Microsoft Windows 2000 Advanced Server
- Microsoft Windows 2000 Datacenter Server SP2
- Microsoft Windows 2000 Datacenter Server SP1
- Microsoft Windows 2000 Datacenter Server
- Microsoft Windows 2000 Server SP2
- Microsoft Windows 2000 Server SP1
- Microsoft Windows 2000 Server
Avaya S8100 Media Servers 0
+ Microsoft Windows 2000 Server
+ Microsoft Windows NT Server 4.0 SP6a
Avaya S3400 Message Application Server 0
+ Microsoft Windows 2000 Server
Avaya Modular Messaging (MSS) 2.0
Avaya Modular Messaging (MSS) 1.1
Avaya IP600 Media Servers
Avaya DefinityOne Media Servers
Microsoft Exchange Server 2003 SP1

- 不受影响的程序版本

Microsoft Exchange Server 2003 SP1

- 漏洞讨论

The Microsoft Windows 2003 SMTP Service and Exchange Routing Engine have been reported prone to a buffer overflow. This occurs during the processing responses to DNS lookups. Successful exploitation could allow for remote code execution in the context of the vulnerable service.

- 漏洞利用

Currently we are not aware of any exploits for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com <mailto:vuldb@securityfocus.com>.

- 解决方案

Microsoft has released a bulletin that includes fixes to address this issue for supported versions of the operating system.

Note that the fix for Exchange Server 2000 Service Pack 3 requires that the Exchange 2000 Server Post-Service Pack 3 (SP3) Update Rollup be installed as a prerequisite. See Knowledge Base article 870540 in the References section for further details on this rollup.


Microsoft Windows Server 2003 Web Edition

Microsoft Exchange Server 2003

Microsoft Windows XP 64-bit Edition Version 2003 SP1

Microsoft Windows Server 2003 Enterprise Edition Itanium 0

Microsoft Windows Server 2003 Datacenter Edition

Microsoft Windows Server 2003 Standard Edition

Microsoft Windows XP 64-bit Edition Version 2003

Microsoft Exchange Server 2000 SP3

Microsoft Exchange Server 2003 SP1

Microsoft Windows Server 2003 Enterprise Edition

Microsoft Windows Server 2003 Datacenter Edition Itanium 0

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站