[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248038

 
 

909

 
 

194772

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

Remote code execution vulnerability in Microsoft Exchange Server - CVE-2019-0817

ID: oval:org.secpod.oval:def:54148Date: (C)2019-04-10   (M)2024-03-26
Class: VULNERABILITYFamily: windows




A spoofing vulnerability exists in Microsoft Exchange Server when Outlook Web Access (OWA) fails to properly handle web requests. An attacker who successfully exploited the vulnerability could perform script or content injection attacks, and attempt to trick the user into disclosing sensitive information. An attacker could also redirect the user to a malicious website that could spoof content or the vulnerability could be used as a pivot to chain an attack with other vulnerabilities in web services.To exploit the vulnerability, an attacker could send a specially crafted email containing a malicious link to a user. An attacker could also use a chat client to social engineer a user into clicking the malicious link. However, in both examples the user must click the malicious link.The security update addresses the vulnerability by correcting how OWA validates web requests.

Platform:
Microsoft Windows 10
Microsoft Windows 7
Microsoft Windows 8.1
Microsoft Windows Server 2008
Microsoft Windows Server 2008 R2
Microsoft Windows Server 2016
Microsoft Windows Server 2019
Microsoft Windows Server 2012
Microsoft Windows Server 2012 R2
Product:
Microsoft Exchange Server 2016
Microsoft Exchange Server 2010
Microsoft Exchange Server 2013
Microsoft Exchange Server 2019
Reference:
CVE-2019-0817
CVE    1
CVE-2019-0817
CPE    7
cpe:/a:microsoft:exchange_server:2013
cpe:/a:microsoft:exchange_server:2010:sp3
cpe:/a:microsoft:exchange:2010
cpe:/a:microsoft:exchange:2010:sp3
...

© SecPod Technologies