ID

VAR-200212-0461


CVE

CVE-2002-1790


TITLE

Microsoft IIS Vulnerabilities used as relay points for email

Trust: 0.8

sources: JVNDB: JVNDB-1999-000028

DESCRIPTION

The SMTP service in Microsoft Internet Information Services (IIS) 4.0 and 5.0 allows remote attackers to bypass anti-relaying rules and send spam or spoofed messages via encapsulated SMTP addresses, a similar vulnerability to CVE-1999-0682. ------------ This vulnerability information is a summary of multiple vulnerabilities released at the same time. Please note that the contents of vulnerability information other than the title are included. ------------ Exchange Server MTA When this server is connected to the Internet, there is a problem that allows e-mail relaying by a third party from the outside. This can be done by inserting certain characters in the email. If this issue is exploited by a malicious remote attacker, SPAM It may be used as a mail relay point. In addition, this issue can be used to target large emails that are large enough to be heavily loaded. Exchange Processing power can be taken away by sending from the server, and as a result DoS The attack will be successful. The vulnerability was originally announced in Microsoft Security Bulletin MS99-027 and reported to affect Exchange Server 5.5. Microsoft released a patch to fix the vulnerability for Exchange Server 5.5 only. There exists no patch for the IIS SMTP service. This vulnerability poses no threat to the data or software on the server, but could allow spam to be sent from the server without the administrator's knowledge or permission, and could lead to a Denial of Service condition if the volume of the mail relayed is sufficient

Trust: 2.16

sources: NVD: CVE-2002-1790 // JVNDB: JVNDB-1999-000028 // BID: 5213 // BID: 567

AFFECTED PRODUCTS

vendor:microsoftmodel:exchange serverscope:eqversion:5.5

Trust: 3.0

vendor:microsoftmodel:internet information serverscope:eqversion:4.0

Trust: 1.6

vendor:microsoftmodel:internet information servicesscope:eqversion:5.0

Trust: 1.0

vendor:microsoftmodel:exchange server sp2scope:eqversion:5.5

Trust: 0.6

vendor:microsoftmodel:exchange server sp1scope:eqversion:5.5

Trust: 0.6

vendor:microsoftmodel:internet information serverscope:eqversion:5.0

Trust: 0.6

vendor:microsoftmodel:iisscope:eqversion:5.0

Trust: 0.3

vendor:microsoftmodel:iisscope:eqversion:4.0

Trust: 0.3

sources: BID: 5213 // BID: 567 // JVNDB: JVNDB-1999-000028 // CNNVD: CNNVD-200212-620 // NVD: CVE-2002-1790

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2002-1790
value: MEDIUM

Trust: 1.0

NVD: CVE-2002-1790
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-200212-620
value: MEDIUM

Trust: 0.6

nvd@nist.gov: CVE-2002-1790
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

sources: JVNDB: JVNDB-1999-000028 // CNNVD: CNNVD-200212-620 // NVD: CVE-2002-1790

PROBLEMTYPE DATA

problemtype:NVD-CWE-noinfo

Trust: 1.0

sources: NVD: CVE-2002-1790

THREAT TYPE

network

Trust: 0.6

sources: BID: 5213 // BID: 567

TYPE

other

Trust: 0.6

sources: CNNVD: CNNVD-200212-620

CONFIGURATIONS

sources: JVNDB: JVNDB-1999-000028

PATCH

title:MS99-027url:http://www.microsoft.com/technet/security/bulletin/MS99-027.mspx

Trust: 0.8

title:MS99-027url:http://www.microsoft.com/japan/technet/security/bulletin/MS99-027.mspx

Trust: 0.8

sources: JVNDB: JVNDB-1999-000028

EXTERNAL IDS

db:BIDid:5213

Trust: 2.7

db:NVDid:CVE-2002-1790

Trust: 2.4

db:BIDid:567

Trust: 1.1

db:JVNDBid:JVNDB-1999-000028

Trust: 0.8

db:CNNVDid:CNNVD-200212-620

Trust: 0.6

sources: BID: 5213 // BID: 567 // JVNDB: JVNDB-1999-000028 // CNNVD: CNNVD-200212-620 // NVD: CVE-2002-1790

REFERENCES

url:http://www.securityfocus.com/bid/5213

Trust: 3.4

url:http://online.securityfocus.com/archive/1/281914

Trust: 2.6

url:http://www.iss.net/security_center/static/9580.php

Trust: 2.6

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2002-1790

Trust: 0.8

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2002-1790

Trust: 0.8

url:http://www.securityfocus.com/bid/567

Trust: 0.8

url:http://www.microsoft.com/technet/treeview/default.asp?url=/technet/security/bulletin/ms99-027.asp

Trust: 0.3

url:http://www.microsoft.com/technet/security/bulletin/fq99-027.asp

Trust: 0.3

url:http://home.win2000archives.com/2000/bugs/ms_exchange__9.html

Trust: 0.3

url:http://support.microsoft.com/support/kb/articles/q282/0/92.asp

Trust: 0.3

url:http://support.microsoft.com/support/kb/articles/q237/9/27.asp

Trust: 0.3

sources: BID: 5213 // BID: 567 // JVNDB: JVNDB-1999-000028 // CNNVD: CNNVD-200212-620 // NVD: CVE-2002-1790

CREDITS

JWC JWC@portcullis-security.com

Trust: 0.6

sources: CNNVD: CNNVD-200212-620

SOURCES

db:BIDid:5213
db:BIDid:567
db:JVNDBid:JVNDB-1999-000028
db:CNNVDid:CNNVD-200212-620
db:NVDid:CVE-2002-1790

LAST UPDATE DATE

2024-11-22T23:08:27.341000+00:00


SOURCES UPDATE DATE

db:BIDid:5213date:2002-07-12T00:00:00
db:BIDid:567date:1999-08-06T00:00:00
db:JVNDBid:JVNDB-1999-000028date:2007-04-01T00:00:00
db:CNNVDid:CNNVD-200212-620date:2020-04-10T00:00:00
db:NVDid:CVE-2002-1790date:2024-11-20T23:42:07.960

SOURCES RELEASE DATE

db:BIDid:5213date:2002-07-12T00:00:00
db:BIDid:567date:1999-08-06T00:00:00
db:JVNDBid:JVNDB-1999-000028date:2007-04-01T00:00:00
db:CNNVDid:CNNVD-200212-620date:2002-07-12T00:00:00
db:NVDid:CVE-2002-1790date:2002-12-31T05:00:00