MS02-037: Microsoft Exchange EHLO Long Hostname Overflow

high Nessus Plugin ID 11053

Synopsis

The remote host has an application that is affected by a buffer overflow vulnerability.

Description

A security vulnerability results because of an unchecked buffer in the IMC code that generates the response to the EHLO protocol command. If the buffer were overrun with data it would result in either the failure of the IMC or could allow the attacker to run code in the security context of the IMC, which runs as Exchange5.5 Service Account.

** Nessus only uses the banner header to determine if this vulnerability exists and does not check for or attempt an actual overflow.

Solution

See the vendor advisory for patch information.

See Also

https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2002/ms02-037

Plugin Details

Severity: High

ID: 11053

File Name: smtp_ms02-037.nasl

Version: 1.24

Type: remote

Published: 7/29/2002

Updated: 4/11/2022

Configuration: Enable thorough checks

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.8

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 5.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: cpe:/a:microsoft:exchange_server

Required KB Items: SMTP/microsoft_esmtp_5

Exploit Ease: No known exploits are available

Vulnerability Publication Date: 7/24/2002

Reference Information

CVE: CVE-2002-0698

BID: 5306

MSFT: MS02-037

MSKB: 326322