CVE-2006-1193
CVSS2.6
发布时间 :2006-06-13 15:06:00
修订时间 :2011-03-07 21:32:21
NMCOS    

[原文]Cross-site scripting (XSS) vulnerability in Microsoft Exchange Server 2000 SP1 through SP3, when running Outlook Web Access (OWA), allows user-assisted remote attackers to inject arbitrary HTML or web script via unknown vectors related to "HTML parsing."


[CNNVD]Microsoft Exchange Server OWA 脚本注入漏洞(CNNVD-200606-277)

        Microsoft Exchange Server是一款流行的邮件服务器。
        Exchange Server在处理邮件中的脚本存在漏洞,导致脚本代码在用户机器上非授权执行。
        运行Outlook Web Access (OWA)的Exchange Server在某些情况下没有正确的过滤邮件中的脚本,导致脚本注入漏洞。攻击者可以通过创建有特制脚本的邮件消息来利用这个漏洞。如果运行了特制脚本的话,就会在客户端以用户的安全环境执行。利用这个漏洞需要用户交互。

- CVSS (基础分值)

CVSS分值: 2.6 [轻微(LOW)]
机密性影响: NONE [对系统的机密性无影响]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: NONE [对系统可用性无影响]
攻击复杂度: HIGH [漏洞利用存在特定的访问条件]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/a:microsoft:exchange_server:2000:sp2Microsoft Exchange Server 2000 Service Pack 2
cpe:/a:microsoft:exchange_server:2000:sp3Microsoft Exchange Server 2000 Service Pack 3
cpe:/a:microsoft:exchange_server:2000:sp1Microsoft Exchange Server 2000 Service Pack 1

- OVAL (用于检测的技术细节)

oval:org.mitre.oval:def:1315Exchange Server 2000 when running Outlook Web Access Vulnerability
oval:org.mitre.oval:def:1161Exchange Server 2003,SP1 when running Outlook Web Access Vulnerability
oval:org.mitre.oval:def:1070Exchange Server 2003,SP2 when running Outlook Web Access Vulnerability
*OVAL详细的描述了检测该漏洞的方法,你可以从相关的OVAL定义中找到更多检测该漏洞的技术细节。

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1193
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2006-1193
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200606-277
(官方数据源) CNNVD

- 其它链接及资源

http://www.us-cert.gov/cas/techalerts/TA06-164A.html
(UNKNOWN)  CERT  TA06-164A
http://www.kb.cert.org/vuls/id/138188
(UNKNOWN)  CERT-VN  VU#138188
http://www.securityfocus.com/bid/18381
(PATCH)  BID  18381
http://www.microsoft.com/technet/security/bulletin/ms06-029.mspx
(VENDOR_ADVISORY)  MS  MS06-029
http://securitytracker.com/id?1016280
(PATCH)  SECTRACK  1016280
http://secunia.com/advisories/20634
(VENDOR_ADVISORY)  SECUNIA  20634
http://www.vupen.com/english/advisories/2006/2326
(UNKNOWN)  VUPEN  ADV-2006-2326
http://www.sec-consult.com/fileadmin/Advisories/20060613-0_owa_xss_noexploit.txt
(UNKNOWN)  MISC  http://www.sec-consult.com/fileadmin/Advisories/20060613-0_owa_xss_noexploit.txt
http://www.osvdb.org/26441
(UNKNOWN)  OSVDB  26441
http://xforce.iss.net/xforce/xfdb/25550
(UNKNOWN)  XF  exchange-owa-xss(25550)
http://lists.grok.org.uk/pipermail/full-disclosure/2006-June/046892.html
(UNKNOWN)  FULLDISC  20060614 SEC Consult SA-20060613-0 :: Outlook Web Access Cross Site Scripting Vulnerability

- 漏洞信息

Microsoft Exchange Server OWA 脚本注入漏洞
低危 跨站脚本
2006-06-13 00:00:00 2006-08-28 00:00:00
远程  
        Microsoft Exchange Server是一款流行的邮件服务器。
        Exchange Server在处理邮件中的脚本存在漏洞,导致脚本代码在用户机器上非授权执行。
        运行Outlook Web Access (OWA)的Exchange Server在某些情况下没有正确的过滤邮件中的脚本,导致脚本注入漏洞。攻击者可以通过创建有特制脚本的邮件消息来利用这个漏洞。如果运行了特制脚本的话,就会在客户端以用户的安全环境执行。利用这个漏洞需要用户交互。

- 公告与补丁

        临时解决方法:
        * 在运行Exchange Server的计算机上禁用Outlook Web Access (OWA)。
        Microsoft已经为此发布了一个安全公告(MS06-029)以及相应补丁:
        MS06-029:Vulnerability in Microsoft Exchange Server Running Outlook Web Access Could Allow Script Injection (912442)
        链接:
        http://www.microsoft.com/technet/security/Bulletin/MS06-029.mspx 临时解决方法:
        * 禁用远程访问连接管理器服务。
        * 在防火墙阻断:
        UDP端口135、137、138、445,以及TCP端口135、139、445、593
        所有大于1024端口上的未经请求的入站通讯
        任何其他明确配置的RPC端口
        * 使用个人防火墙,如Windows XP和Windows Server 2003捆绑的Internet连接防火墙。
        * 在支持的系统上启用高级TCP/IP过滤功能。
        * 在受影响的系统上使用IPSec阻断受影响的端口。
        Microsoft已经为此发布了一个安全公告(MS06-025)以及相应补丁:
        MS06-025:Vulnerability in Routing and Remote Access Could Allow Remote Code Execution (911280)
        链接:
        http://www.microsoft.com/technet/security/Bulletin/MS06-025.mspx

- 漏洞信息

26441
Microsoft Exchange Server Outlook Web Access HTML Parsing Unspecified XSS
Remote / Network Access Input Manipulation
Loss of Integrity
Exploit Unknown

- 漏洞描述

Exchange Server contains an unspcified Cross Site Scripting flaw in Outlook Web Access that may allow an attacker to execute arbitrary code as a target user with a specially crafted email. No further details have been provided.

- 时间线

2006-06-13 Unknow
Unknow Unknow

- 解决方案

Currently, there are no known workarounds or upgrades to correct this issue. However, Microsoft has released a patch to address this vulnerability.

- 相关参考

- 漏洞作者

- 漏洞信息

Microsoft Exchange Server Outlook Web Access Script Injection Vulnerability
Input Validation Error 18381
Yes No
2006-06-13 12:00:00 2006-06-28 04:34:00
Daniel Fabian discovered this issue.

- 受影响的程序版本

Microsoft Exchange Server 2003 SP2
Microsoft Exchange Server 2003 SP1
Microsoft Exchange Server 2000 SP3

- 漏洞讨论

Microsoft Exchange Server Outlook Web Access is prone to a script-injection vulnerability.

A remote attacker can exploit this issue by sending a malicious email message to a vulnerable user.

- 漏洞利用

Attackers can exploit this issue by sending a malicious email. Exploit code is not required.

A proof of concept that targets browsers other than Internet Explorer is available.

- 解决方案

Microsoft has released an advisory including fixes to address this issue.


Microsoft Exchange Server 2003 SP1

Microsoft Exchange Server 2000 SP3

Microsoft Exchange Server 2003 SP2

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站