This script is Copyright (C) 2011-2013 Tenable Network Security, Inc.
The remote mail server may be affected by multiple vulnerabilities.
The installed version of Microsoft Exchange / Windows SMTP Service
is affected by at least one vulnerability :
- Incorrect parsing of DNS Mail Exchanger (MX) resource
records could cause the Windows Simple Mail Transfer
Protocol (SMTP) component to stop responding until
the service is restarted. (CVE-2010-0024)
- Improper allocation of memory for interpreting SMTP
command responses may allow an attacker to read random
email message fragments stored on the affected server.
- Predictable transaction IDs are used, which could allow
a man-in-the-middle attacker to spoof DNS responses.
- There is no verification that the transaction ID of a
response matches the transaction ID of a query, which
could allow a man-in-the-middle attacker to spoof DNS
See also :
Microsoft has released a set of patches for Windows 2000, XP, 2003,
and 2008 as well as Exchange Server 2000, 2003, 2007, and 2010.
Risk factor :
Medium / CVSS Base Score : 6.4
CVSS Temporal Score : 5.3
Public Exploit Available : true