- These vulnerabilities affect: Exchange Server 2007 and 2010
- How an attacker exploits it: By enticing a user to preview a specially crafted email attachment using OWA
- Impact: An attacker can execute code with the restricted privileges of the LocalService account
- What to do: Deploy the appropriate Exchange Server update as soon as possible, or let Windows Automatic Update do it for you
Microsoft Exchange is one of the most popular email servers used today. It includes many advanced features and capabilities. One such feature, called WebReady Document Viewing, allows your email users to preview attached documents as web pages. Exchange leverages Oracle’s Outside In technology to parse these documents and provide these previews.
According to today’s bulletin, Exchange suffers from two vulnerabilities related to Oracle’s Outside In; a remote code execution flaw and a Denial of Service (DoS) issue. Both vulnerabilities have to do with how WebReady Document Viewing parses certain files when showing previews. By enticing one of your web-based email users to preview an email with a specially crafted attachment, an attacker can exploit the worst of these flaws to execute code directly on your Exchange server. Luckily, the code only runs with LocalService account permissions, which has very limited privileges.
Also, this attack only works against victims who check and preview mail using Exchange’s Outlook Web App (OWA). If your users only get email from Exchange using email clients, and you don’t enable OWA, attackers may not be able to leverage this flaw against your server. However, we still recommend Exchange administrators update as soon as possible.
By the way, if this issue seems familiar to you, it’s because it is very similar to a previous Exchange WebReady Document Viewing issue from last year.
Microsoft has released Exchange updates to correct these vulnerabilities. You should download, test, and deploy the appropriate update as soon as possible, or let Windows Update do it for you. You can find the updates in the “Affected and Non-Affected Software” section of Microsoft’s Exchange bulletin.
UPDATE: At least one of our readers has reported issues when trying to install the Exchange update. Be sure to test before pushing this to production.
For All WatchGuard Users:
Though you can configure 0ur XTM and XCS appliances to strip certain attachments from email, this sort of attack may arrive as many types of attachments, including ones you may want to allow for business. We recommend you apply the patches instead.
Microsoft has released patches to fix these vulnerabilities.
This alert was researched and written by Corey Nachreiner, CISSP (@SecAdept).
I’ve tried to install the update on 2 different Exchange servers and they both fail. Haven’t dug into the logs yet but I HOPE there isn’t an issue with this like there was with the other rollups that wouldn’t install. I am on Exchange 2010 SP2, trying to install rollup 6.
Corey Nachreiner says
Thanks for this feedback. I have actually updated the alert to let people know your experience, and to remind them to be sure and test this update before pushing it to production. That’s a perfect example of why we tend to recommend testing patching before pushing them–especially server patches.
I like the helpful information you provide in your articles.
I’ll bookmark your weblog and check again here frequently.
I am quite certain I will learn many new stuff right
here! Good luck for the next!
quotes about relationships says
Greetings! Very helpful advice in this particular post!
It is the little changes that produce the biggest changes. Thanks a lot for sharing!
I visit every day a few web sites and websites to read
content, but this web site presents feature based posts.
Car Dealer Websites says
I’m amazed, I must say. Seldom do I encounter a blog that’s both educative and entertaining, and let me tell you, you have hit the nail on the head.
The problem is something that too few folks are speaking intelligently about.
I am very happy that I found this in my search
for something relating to this.
Wow! In the end I got a weblog from where I can truly obtain useful information concerning my study and knowledge.