SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (E-mail Server)  >   Microsoft Exchange Vendors:   Microsoft
Microsoft Exchange E-mail Processing Flaw Lets Remote Users Execute Arbitrary Code on the Target System
SecurityTracker Alert ID:  1041468
SecurityTracker URL:  http://securitytracker.com/id/1041468
CVE Reference:   CVE-2018-8302   (Links to External Site)
Date:  Aug 14 2018
Impact:   Execution of arbitrary code via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 2010 SP3 Update Rollup 23, 2013 CU20, 2013 CU21, 2016 CU9, 2016 CU10
Description:   A vulnerability was reported in Microsoft Exchange. A remote user can execute arbitrary code on the target system.

A remote user can send specially crafted email to trigger an object memory handling error and execute arbitrary code on the target Exchange server system. The code will run with System privileges.

Anonymous (via Trend Micro Zero Day Initiative) reported this vulnerability.

Impact:   A remote user can execute arbitrary code on the target system.
Solution:   The vendor has issued a fix.

The Microsoft advisories are available at:

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8302
https://www.microsoft.com/downloads/details.aspx?familyid=a4b1db71-46c5-4322-9ec8-b3a4e7c3f144
https://www.microsoft.com/downloads/details.aspx?familyid=44c03bea-9af6-427e-b8f3-a1a83a9ea488
https://www.microsoft.com/downloads/details.aspx?familyid=7094c065-2f08-43fa-9031-dcdd651d98e1
https://www.microsoft.com/downloads/details.aspx?familyid=4392a20a-0c93-4385-bebd-809f8ca5213b

Vendor URL:  portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8302 (Links to External Site)
Cause:   Access control error

Message History:   None.


 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC