Computer Security
[EN] securityvulns.ru no-pyccku


Related information

  Доступ к глобальному списку адресов в Exchange 5.5 (unauthorized access)

  Exchange Public Folders Information Leakage

From:MICROSOFT <secure_(at)_microsoft.com>
Date:07.09.2001
Subject:Security Bulletin MS01-047

- ----------------------------------------------------------------------
Title:      OWA Function Allows Unauthenticated User to Enumerate
           Global Address List
Date:       06 September 2001
Software:   Exchange 5.5
Impact:     Information Disclosure
Bulletin:   MS01-047

Microsoft encourages customers to review the Security Bulletin at:
http://www.microsoft.com/technet/security/bulletin/MS01-047.asp.
- ----------------------------------------------------------------------

Issue:
======
Among the functions Outlook Web Access (OWA) in Exchange 5.5 offers
is the ability to search the global address list (GAL). By design,
this is an authenticated function, implemented as a two-tier
architecture - a front tier that provides a user interface and a
back-end tier that actually performs the search. However, only the
front tier actually checks authentication. An attacker who sent a
properly formatted request to the back-end function that actually
performs the search could enumerate the GAL without authenticating.

Mitigating Factors:
====================
- The vulnerability would only allow the attacker to learn
  users' email aliases. It would not provide any other
  capabilities. Specifically, it would not give the attacker
  any way to create or send mail as a user; to read, change
  or delete mail; or to perform any other functions on the
  server.
- The vulnerability is only exploitable via OWA. Exchange
  servers that are not configured to offer OWA are not affected
  by the vulnerability.
- The vulnerability does not affect Exchange 2000, even when
  offering OWA.

Patch Availability:
===================
- A patch is available to fix this vulnerability. Please read the
  Security Bulletin at
  http://www.microsoft.com/technet/security/bulletin/ms01-047.asp
  for information on obtaining this patch.

Acknowledgment:
===============
- Noam Rathaus from SecuriTeam.com (http://www.SecuriTeam.com)

- ---------------------------------------------------------------------

THE INFORMATION PROVIDED IN THE MICROSOFT KNOWLEDGE BASE IS PROVIDED
"AS IS" WITHOUT WARRANTY OF ANY KIND. MICROSOFT DISCLAIMS ALL
WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING THE WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. IN NO EVENT
SHALL MICROSOFT CORPORATION OR ITS SUPPLIERS BE LIABLE FOR ANY
DAMAGES WHATSOEVER INCLUDING DIRECT, INDIRECT, INCIDENTAL,
CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR SPECIAL DAMAGES, EVEN IF
MICROSOFT CORPORATION OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE
POSSIBILITY OF SUCH DAMAGES. SOME STATES DO NOT ALLOW THE EXCLUSION
OR LIMITATION OF LIABILITY FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES SO
THE FOREGOING LIMITATION MAY NOT APPLY.

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod