Executive Summary



This Alert is flagged as TOP 25 Common Weakness Enumeration from CWE/SANS. For more information, you can read this.
Summary
Title Vulnerabilities in Microsoft Exchange Server Could Allow Elevation of Privilege (3009712)
Informations
Name MS14-075 First vendor Publication 2014-12-09
Vendor Microsoft Last vendor Modification 2014-12-12
Severity (Vendor) Important Revision 3.0

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:N/I:P/A:N)
Cvss Base Score 5 Attack Range Network
Cvss Impact Score 2.9 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Severity Rating: Important
Revision Note: V3.0 (December 12, 2014): Rereleased bulletin to announce the reoffering of Microsoft security update 2986475 for Microsoft Exchange Server 2010 Service Pack 3. The rereleased update addresses a known issue in the original offering. Customers who uninstalled the original update should install the updated version of 2986475 at the earliest opportunity.
Summary: This security update resolves four privately reported vulnerabilities in Microsoft Exchange Server. The most severe of these vulnerabilities could allow elevation of privilege if a user clicks a specially crafted URL that takes them to a targeted Outlook Web App site. An attacker would have no way to force users to visit a specially crafted website. Instead, an attacker would have to convince them to visit the website, typically by getting them to click a link in an email message or Instant Messenger message that takes them to the attacker's website, and then convince them to click the specially crafted URL.

Original Source

Url : https://technet.microsoft.com/en-us/library/security/MS14-075

CWE : Common Weakness Enumeration

% Id Name
50 % CWE-79 Failure to Preserve Web Page Structure ('Cross-site Scripting') (CWE/SANS Top 25)
25 % CWE-284 Access Control (Authorization) Issues
25 % CWE-20 Improper Input Validation

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:28291
 
Oval ID: oval:org.mitre.oval:def:28291
Title: OWA XSS vulnerability (CVE-2014-6325) - MS14-075
Description: Cross-site scripting (XSS) vulnerability in Microsoft Exchange Server 2013 SP1 and Cumulative Update 6 allows remote attackers to inject arbitrary web script or HTML via a crafted URL, aka "OWA XSS Vulnerability," a different vulnerability than CVE-2014-6326.
Family: windows Class: vulnerability
Reference(s): CVE-2014-6325
Version: 3
Platform(s): Microsoft Windows Server 2008 R2
Microsoft Windows 7
Microsoft Windows 8
Microsoft Windows 8.1
Microsoft Windows Server 2012
Microsoft Windows Server 2012 R2
Product(s): Microsoft Exchange Server 2013
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:28328
 
Oval ID: oval:org.mitre.oval:def:28328
Title: OWA XSS vulnerability (CVE-2014-6326) - MS14-075
Description: Cross-site scripting (XSS) vulnerability in Microsoft Exchange Server 2013 SP1 and Cumulative Update 6 allows remote attackers to inject arbitrary web script or HTML via a crafted URL, aka "OWA XSS Vulnerability," a different vulnerability than CVE-2014-6325.
Family: windows Class: vulnerability
Reference(s): CVE-2014-6326
Version: 3
Platform(s): Microsoft Windows Server 2008 R2
Microsoft Windows 7
Microsoft Windows 8
Microsoft Windows 8.1
Microsoft Windows Server 2012
Microsoft Windows Server 2012 R2
Product(s): Microsoft Exchange Server 2013
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:28415
 
Oval ID: oval:org.mitre.oval:def:28415
Title: Exchange URL redirection vulnerability (CVE-2014-6336) - MS14-075
Description: Outlook Web App (OWA) in Microsoft Exchange Server 2013 SP1 and Cumulative Update 6 does not properly validate redirection tokens, which allows remote attackers to redirect users to arbitrary web sites and spoof the origin of e-mail messages via unspecified vectors, aka "Exchange URL Redirection Vulnerability."
Family: windows Class: vulnerability
Reference(s): CVE-2014-6336
Version: 3
Platform(s): Microsoft Windows Server 2008 R2
Microsoft Windows 7
Microsoft Windows 8
Microsoft Windows 8.1
Microsoft Windows Server 2012
Microsoft Windows Server 2012 R2
Product(s): Microsoft Exchange Server 2013
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:28425
 
Oval ID: oval:org.mitre.oval:def:28425
Title: Outlook Web App token spoofing vulnerability (CVE-2014-6319) - MS14-075
Description: Outlook Web App (OWA) in Microsoft Exchange Server 2007 SP3, 2010 SP3, and 2013 SP1 and Cumulative Update 6 does not properly validate tokens in requests, which allows remote attackers to spoof the origin of e-mail messages via unspecified vectors, aka "Outlook Web App Token Spoofing Vulnerability."
Family: windows Class: vulnerability
Reference(s): CVE-2014-6319
Version: 3
Platform(s): Microsoft Windows Server 2003
Microsoft Windows Server 2008
Microsoft Windows Server 2008 R2
Microsoft Windows 7
Microsoft Windows 8
Microsoft Windows 8.1
Microsoft Windows Server 2012
Microsoft Windows Server 2012 R2
Product(s): Microsoft Exchange Server 2007
Microsoft Exchange Server 2010
Microsoft Exchange Server 2013
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 4

Information Assurance Vulnerability Management (IAVM)

Date Description
2014-12-11 IAVM : 2014-A-0186 - Multiple Vulnerabilities in Microsoft Exchange Server (MS14-075)
Severity : Category II - VMSKEY : V0057713

Snort® IPS/IDS

Date Description
2015-01-08 Microsoft Exchange OWA meeting invite XSS attempt
RuleID : 32705 - Revision : 2 - Type : SERVER-MAIL
2015-01-08 Microsoft Outlook Web Access parameter cross site scripting attempt
RuleID : 32682 - Revision : 3 - Type : SERVER-WEBAPP
2015-01-08 Microsoft Outlook Web Access parameter cross site scripting attempt
RuleID : 32681 - Revision : 3 - Type : SERVER-WEBAPP

Nessus® Vulnerability Scanner

Date Description
2014-12-09 Name : The remote mail server is affected by multiple vulnerabilities.
File : smb_nt_ms14-075.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
Date Informations
2018-10-13 05:21:19
  • Multiple Updates
2015-10-18 17:26:24
  • Multiple Updates
2015-01-08 21:27:45
  • Multiple Updates
2014-12-12 21:26:59
  • Multiple Updates
2014-12-12 21:16:18
  • Multiple Updates
2014-12-11 21:27:19
  • Multiple Updates
2014-12-11 05:32:08
  • Multiple Updates
2014-12-11 00:26:50
  • Multiple Updates
2014-12-11 00:15:46
  • Multiple Updates
2014-12-10 13:27:03
  • Multiple Updates
2014-12-09 21:29:38
  • Multiple Updates
2014-12-09 21:16:31
  • First insertion