SMTP: Microsoft Outlook Web Access JavaScript Execution

This signature detects attempts to exploit a known vulnerability against Microsoft Exchange. Attackers can cause Outlook Web Access to allow JavaScript execution if it is called upon to read a maliciously crafted e-mail.

Extended Description

Microsoft Outlook Web Access is prone to a script-injection vulnerability because the application fails to properly handle specially crafted email attachments. To exploit this issue, attackers must send specially crafted files through email messages to users of the affected application. When users open the file, attacker-supplied script code will be executed in the context of the affected website. Successful exploits allow attackers to access Outlook Web Access sessions with the privileges of the targeted user. As a result, attackers may be able to obtain sensitive information and send, modify, or delete email; other attacks are also possible.

Affected Products

Avaya messaging_application_server,Microsoft exchange_server_2003

Short Name
SMTP:EXCHANGE:OWA-JSCRIPT
Severity
Warning
Recommended
False
Recommended Action
None
Category
SMTP
Keywords
Access CVE-2007-0220 Execution JavaScript Microsoft Outlook Web bid:23806
Release Date
05/08/2007
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3336
False Positive
Unknown
Vendors

Avaya

Microsoft

CVSS Score

6.8

Found a potential security threat?