MS02-037: Microsoft Exchange EHLO Long Hostname Overflow

High Nessus Plugin ID 11053


The remote host has an application that is affected by a buffer overflow vulnerability.


A security vulnerability results because of an unchecked buffer in the IMC code that generates the response to the EHLO protocol command. If the buffer were overrun with data it would result in either the failure of the IMC or could allow the attacker to run code in the security context of the IMC, which runs as Exchange5.5 Service Account.

** Nessus only uses the banner header to determine if this vulnerability exists and does not check for or attempt an actual overflow.


See the vendor advisory for patch information.

See Also

Plugin Details

Severity: High

ID: 11053

File Name: smtp_ms02-037.nasl

Version: $Revision: 1.21 $

Type: remote

Published: 2002/07/29

Modified: 2017/08/30

Dependencies: 10263, 17975

Risk Information

Risk Factor: High


Base Score: 7.5

Temporal Score: 5.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:microsoft:exchange_server

Required KB Items: SMTP/microsoft_esmtp_5

Exploit Available: false

Exploit Ease: No known exploits are available

Vulnerability Publication Date: 2002/07/24

Reference Information

CVE: CVE-2002-0698

BID: 5306

MSFT: MS02-037

MSKB: 326322