Check Point Reference: | CPAI-2009-010 |
Date Published: | 10 Feb 2009 |
Severity: | Critical |
Last Updated: | Monday 15 December, 2014 |
Source: | |
Industry Reference: | CVE-2009-0098 |
Protection Provided by: |
Security Gateway |
Who is Vulnerable? | |
Vulnerability Description | The Microsoft Exchange Server is an implementation of an email server capable of handling numerous Internet protocol, including the Simple Mail Transfer Protocol (SMTP). Transport Neutral Encapsulation Format (TNEF) is a format used by the Microsoft Exchange Server when sending messages formatted as Rich Text Format (RTF). A remote code execution vulnerability has been reported in the way Microsoft Exchange Server decodes the TNEF data for a message. The vulnerability is due to an error in the Exchange server that does not properly decode messages in TNEF format. A remote attacker may exploit this issue via a specially crafted TNEF message. Successful exploitation of this issue could allow execution of arbitrary code when a user opens or previews a malicious e-mail message or when the Microsoft Exchange Server Information Store processes the specially crafted TNEF message. |
This protection will detect and block the transferring of malformed RTF files over SMTP.
In order for the protection to be activated, update your Security Gateway product to the latest IPS update. For information on how to update IPS, go to SBP-2006-05, click on Protection tab and select the version of your choice.
This protection's log will contain the following information:
Attack Name: SMTP Protection Violation.
Attack Information: Microsoft Exchange server MS-TNEF memory corruption (MS09-003)