MS10-024: Vulnerabilities in Microsoft Exchange and Windows SMTP Service Could Allow Denial of Service (981832)

This script is Copyright (C) 2011-2013 Tenable Network Security, Inc.


Synopsis :

The remote mail server may be affected by multiple vulnerabilities.

Description :

The installed version of Microsoft Exchange / Windows SMTP Service
is affected by at least one vulnerability :

- Incorrect parsing of DNS Mail Exchanger (MX) resource
records could cause the Windows Simple Mail Transfer
Protocol (SMTP) component to stop responding until
the service is restarted. (CVE-2010-0024)

- Improper allocation of memory for interpreting SMTP
command responses may allow an attacker to read random
email message fragments stored on the affected server.
(CVE-2010-0025)

- Predictable transaction IDs are used, which could allow
a man-in-the-middle attacker to spoof DNS responses.
(CVE-2010-1689)

- There is no verification that the transaction ID of a
response matches the transaction ID of a query, which
could allow a man-in-the-middle attacker to spoof DNS
responses. (CVE-2010-1690)

See also :

http://technet.microsoft.com/en-us/security/bulletin/MS10-024

Solution :

Microsoft has released a set of patches for Windows 2000, XP, 2003,
and 2008 as well as Exchange Server 2000, 2003, 2007, and 2010.

Risk factor :

Medium / CVSS Base Score : 6.4
(CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:P)
CVSS Temporal Score : 5.3
(CVSS2#E:F/RL:OF/RC:ND)
Public Exploit Available : true

Family: Windows : Microsoft Bulletins

Nessus Plugin ID: 45511 ()

Bugtraq ID: 39308
39381
39908
39910

CVE ID: CVE-2010-0024
CVE-2010-0025
CVE-2010-1689
CVE-2010-1690