Make Homepage | Add To Favorites | Print Page | Submit News | Feedback | Contact | 

Your Technical Computer Information Resource!  
     
 
Keep TACKtech.com free by purchasing something from our sponsors.
Make a financial contribution
  Technical Updates @ TACKtech Corp.  

01.13.2004 - MS04-002: Vulnerability in Exchange Server 2003 Could Lead to Privilege Escalation (832759)



View Microsoft-Exchange related news. A vulnerability exists in the way that Hypertext Transfer Protocol (HTTP) connections are reused when NTLM authentication is used between front-end Exchange 2003 servers providing OWA access and , when running Outlook Web Access (OWA) on Windows 2000 and Windows Server 2003, and when using back-end Exchange 2003 servers that are running Windows Server 2003.

Users who access their mailboxes through an Exchange 2003 front-end server and Outlook Web Access might get connected to another user's mailbox if that other mailbox is (1) hosted on the same back-end mailbox server and (2) if that mailbox has been recently accessed by its owner. Attackers seeking to exploit this vulnerability could not predict which mailbox they might become connected to. The vulnerability causes random and unreliable access to mailboxes and is specifically limited to mailboxes that have recently been accessed through OWA.

By default, Kerberos authentication is used as the HTTP authentication method between Exchange Server 2003 front-end and back-end Exchange servers. This behavior manifests itself only in deployments where OWA is used in an Exchange front-end/back-end server configuration and Kerberos has been disabled as an authentication method for OWA communication between the front-end and back-end Exchange servers.

This vulnerability is exposed if the Web site that is running the Exchange Server 2003 programs on the Exchange back-end server has been configured not to negotiate Kerberos authentication, causing OWA to fall back to using NTLM authentication. The only known way that this vulnerability can be exposed is by a change in the default configuration of Internet Information Services 6.0 on the Exchange back-end server. This vulnerability cannot be exposed by a routine fallback to NTLM because of a problem with Kerberos authentication. This configuration change may occur when Microsoft Windows SharePoint Services (WSS) 2.0 is installed on a Windows Server 2003 server that also functions as an Exchange Server 2003 back-end.

- Download Microsoft Exchange Server 2003 Patch
- View Microsoft Security Bulletin MS04-002
- View Microsoft Knowledge Base Article - 832759
- Visit Microsoft Corporation

NID: 2060 / Submitted by: TACKtech Team
Categories: Email Applications, Internet Applications, Microsoft, Patches and Updates, Server Applications
Most recent Microsoft-Exchange related news.
MS09-003 - Critical: Vulnerabilities in Microsoft Exchange Could Allow Remote Code Execution (959239)
MS08-039 - Important: Vulnerabilities in Outlook Web Access for Exchange Server Could Allow Elevation of Privilege (953747)
Microsoft Exchange Hosted Services Directory Synchronization Tool 8.1
Update Rollup 4 for Exchange Server 2007 (KB940006)
MS07-026: Vulnerabilities in Microsoft Exchange Could Allow Remote Code Execution (931832)
View archive of Microsoft-Exchange related news.

Visit the TACKtech Shop
  Popular Tech News  
  Most Viewed News  
  Top Affiliates  
........