|Check Point Reference:||CPAI-2008-095|
|Date Published:||8 Jul 2008|
|Last Updated:||Wednesday 04 January, 2017|
|Protection Provided by:||
|Who is Vulnerable?||Microsoft Exchange Server 2003 Service Pack 2|
|Vulnerability Description||Outlook Web Access (OWA) is a webmail service of Microsoft Exchange Server 5.0 and later. The web interface of OWA resembles the interface in Microsoft Outlook. A cross-site scripting vulnerability has been detected in Outlook Web Access. The vulnerability is a result of OWA failure to properly validating e-mail fields when opening mail from within OWA. An attacker could exploit this vulnerability by sending a specially crafted e-mail message to the victim. Successful exploitation of this issue could allow the attacker to login to the OWA session, leading to elevation of privilege.|
|Update/Patch Avaliable||Apply patches from: MS08-039|
This protection will detect and block malformed SMTP messages.
In order for the protection to be activated, update your Security Gateway product to the latest IPS update. For information on how to update IPS, go to SBP-2006-05, click on Protection tab and select the version of your choice.
This protection's log will contain the following information:
Attack Name: SMTP Protection Violation.
Attack Information: Microsoft Outlook Web Access data validation cross site scripting (MS08-039)