Executive Summary



This Alert is flagged as TOP 25 Common Weakness Enumeration from CWE/SANS. For more information, you can read this.
Summary
TitleVulnerabilities in Microsoft Exchange Server Could Allow Elevation of Privilege (3040856)
Informations
NameMS15-026First vendor Publication2015-03-10
VendorMicrosoftLast vendor Modification2015-03-10
Severity (Vendor) ImportantRevision1.0

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:N/I:P/A:N)
Cvss Base Score5Attack RangeNetwork
Cvss Impact Score2.9Attack ComplexityLow
Cvss Expoit Score10AuthenticationNone Required
Calculate full CVSS 2.0 Vectors scores

Detail

Severity Rating: Important
Revision Note: V1.0 (March 10, 2015): Bulletin published.
Summary: This security update resolves vulnerabilities in Microsoft Exchange Server. The most severe of the vulnerabilities could allow elevation of privilege if a user clicks a specially crafted URL that takes them to a targeted Outlook Web App site. An attacker would have no way to force users to visit a specially crafted website. Instead, an attacker would have to convince them to visit the website, typically by getting them to click a link in an instant messenger or email message that takes them to the attacker's website, and then convince them to click the specially crafted URL.

Original Source

Url : https://technet.microsoft.com/en-us/library/security/MS15-026

CWE : Common Weakness Enumeration

%idName
80 %CWE-79Failure to Preserve Web Page Structure ('Cross-site Scripting') (CWE/SANS Top 25)
20 %CWE-284Access Control (Authorization) Issues

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:28524
 
Oval ID: oval:org.mitre.oval:def:28524
Title: Audit report cross site scripting vulnerability - CVE-2015-1630 (MS15-026)
Description: Cross-site scripting (XSS) vulnerability in Outlook Web App (OWA) in Microsoft Exchange Server 2013 SP1 and Cumulative Update 7 allows remote attackers to inject arbitrary web script or HTML via a crafted URL, aka "Audit Report Cross Site Scripting Vulnerability."
Family: windows Class: vulnerability
Reference(s): CVE-2015-1630
Version: 3
Platform(s): Microsoft Windows Server 2008 R2
Microsoft Windows Server 2012
Microsoft Windows Server 2012 R2
Product(s): Microsoft Exchange Server 2013
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:27900
 
Oval ID: oval:org.mitre.oval:def:27900
Title: Exchange error message cross site scripting vulnerability - CVE-2015-1632 (MS15-026)
Description: Cross-site scripting (XSS) vulnerability in errorfe.aspx in Outlook Web App (OWA) in Microsoft Exchange Server 2013 SP1 and Cumulative Update 7 allows remote attackers to inject arbitrary web script or HTML via the msgParam parameter in an authError action, aka "Exchange Error Message Cross Site Scripting Vulnerability."
Family: windows Class: vulnerability
Reference(s): CVE-2015-1632
Version: 3
Platform(s): Microsoft Windows Server 2008 R2
Microsoft Windows Server 2012
Microsoft Windows Server 2012 R2
Product(s): Microsoft Exchange Server 2013
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:28811
 
Oval ID: oval:org.mitre.oval:def:28811
Title: OWA modified canary parameter cross site scripting vulnerability - CVE-2015-1628 (MS15-026)
Description: Cross-site scripting (XSS) vulnerability in Outlook Web App (OWA) in Microsoft Exchange Server 2013 SP1 and Cumulative Update 7 allows remote attackers to inject arbitrary web script or HTML via a crafted X-OWA-Canary cookie in an AD.RecipientType.User action, aka "OWA Modified Canary Parameter Cross Site Scripting Vulnerability."
Family: windows Class: vulnerability
Reference(s): CVE-2015-1628
Version: 3
Platform(s): Microsoft Windows Server 2008 R2
Microsoft Windows Server 2012
Microsoft Windows Server 2012 R2
Product(s): Microsoft Exchange Server 2013
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:28748
 
Oval ID: oval:org.mitre.oval:def:28748
Title: ExchangeDLP cross site scripting vulnerability - CVE-2015-1629 (MS15-026)
Description: Cross-site scripting (XSS) vulnerability in Outlook Web App (OWA) in Microsoft Exchange Server 2013 SP1 and Cumulative Update 7 allows remote attackers to inject arbitrary web script or HTML via a crafted URL, aka "ExchangeDLP Cross Site Scripting Vulnerability."
Family: windows Class: vulnerability
Reference(s): CVE-2015-1629
Version: 3
Platform(s): Microsoft Windows Server 2008 R2
Microsoft Windows Server 2012
Microsoft Windows Server 2012 R2
Product(s): Microsoft Exchange Server 2013
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:28294
 
Oval ID: oval:org.mitre.oval:def:28294
Title: Exchange forged meeting request spoofing vulnerability - CVE-2015-1631 (MS15-026)
Description: Microsoft Exchange Server 2013 SP1 and Cumulative Update 7 allows remote attackers to spoof meeting organizers via unspecified vectors, aka "Exchange Forged Meeting Request Spoofing Vulnerability."
Family: windows Class: vulnerability
Reference(s): CVE-2015-1631
Version: 3
Platform(s): Microsoft Windows Server 2008 R2
Microsoft Windows Server 2012
Microsoft Windows Server 2012 R2
Product(s): Microsoft Exchange Server 2013
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application2

Information Assurance Vulnerability Management (IAVM)

DateDescription
2015-03-12IAVM : 2015-A-0049 - Multiple Vulnerabilities in Microsoft Exchange Server (MS15-026)
Severity : Category II - VMSKEY : V0058991

Snort® IPS/IDS

DateDescription
2015-04-14Microsoft Exchange UM Management user stored XSS attempt
RuleID : 33811 - Revision : 3 - Type : SERVER-MAIL
2015-04-14Microsoft Exchange Server custom DLP policy name cross-site scripting attempt
RuleID : 33810 - Revision : 3 - Type : SERVER-OTHER
2015-04-14Microsoft Exchange OWA X-OWA-CANARY command injection attempt
RuleID : 33807 - Revision : 3 - Type : SERVER-MAIL
2015-04-14Microsoft Outlook WebAccess msgParam cross site scripting attempt
RuleID : 33762 - Revision : 3 - Type : SERVER-WEBAPP

Nessus® Vulnerability Scanner

DateDescription
2015-03-10Name : The remote Microsoft Exchange server is affected by multiple vulnerabilities.
File : smb_nt_ms15-026.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
DateInformations
2015-10-18 17:26:30
  • Multiple Updates
2015-04-14 21:26:09
  • Multiple Updates
2015-03-11 21:26:30
  • Multiple Updates
2015-03-11 17:26:21
  • Multiple Updates
2015-03-11 13:25:06
  • Multiple Updates
2015-03-10 21:27:53
  • Multiple Updates
2015-03-10 21:17:11
  • First insertion