Short Name |
SMTP:EXCHANGE:OWA-JSCRIPT |
---|---|
Severity |
Low |
Recommended |
No |
Category |
SMTP |
Keywords |
Microsoft Outlook Web Access JavaScript Execution |
Release Date |
2007/05/08 |
Update Number |
1213 |
Supported Platforms |
idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+ |
This signature detects attempts to exploit a known vulnerability against Microsoft Exchange. Attackers can cause Outlook Web Access to allow JavaScript execution if it is called upon to read a maliciously crafted e-mail.
Microsoft Outlook Web Access is prone to a script-injection vulnerability because the application fails to properly handle specially crafted email attachments. To exploit this issue, attackers must send specially crafted files through email messages to users of the affected application. When users open the file, attacker-supplied script code will be executed in the context of the affected website. Successful exploits allow attackers to access Outlook Web Access sessions with the privileges of the targeted user. As a result, attackers may be able to obtain sensitive information and send, modify, or delete email; other attacks are also possible.