SMTP: Microsoft Windows SMTP Service DNS Response Spoofing 2

This signature detects attempts to exploit a known spoofing vulnerability in Microsoft Windows Simple Mail Transfer Protocol (SMTP) Service. It is due to insufficient validation of DNS responses to queries made by the SMTP service. A successful attack can allow remote unauthenticated attackers to cause redirection of e-mail traffic.

Extended Description

The DNS implementation in smtpsvc.dll before 6.0.2600.5949 in Microsoft Windows 2000 SP4 and earlier, Windows XP SP3 and earlier, Windows Server 2003 SP2 and earlier, Windows Server 2008 SP2 and earlier, Windows Server 2008 R2, Exchange Server 2003 SP3 and earlier, Exchange Server 2007 SP2 and earlier, and Exchange Server 2010 does not verify that transaction IDs of responses match transaction IDs of queries, which makes it easier for man-in-the-middle attackers to spoof DNS responses, a different vulnerability than CVE-2010-0024 and CVE-2010-0025.

Affected Products

Microsoft windows_2000

References

BugTraq: 39910

CVE: CVE-2010-1690

Short Name
SMTP:RESP-SPOOF2
Severity
Major
Recommended
False
Recommended Action
None
Category
SMTP
Keywords
2 CVE-2010-1690 DNS Microsoft Response SMTP Service Spoofing Windows bid:39910
Release Date
02/11/2016
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3761
False Positive
Unknown
Vendors

Microsoft

CVSS Score

6.4

Found a potential security threat?