Check Point Reference: | CPAI-2012-113 |
Date Published: | 26 Mar 2012 |
Severity: | High |
Last Updated: | Friday 22 November, 2024 |
Source: | CVE-2007-0221 |
Protection Provided by: |
Security Gateway |
Who is Vulnerable? | Microsoft Exchange Server 2000 SP2 and SP3 |
Vulnerability Description | An integer overflow vulnerability has been reported in Microsoft Exchange Server. |
Vulnerability Details | The vulnerability is due to an error when processing an invalid IMAP command that contains overly long verb literals. A remote attacker can exploit this flaw by sending specially crafted IMAP commands to an affected version of Microsoft Exchange Server. Successful exploitation will allow an attacker to create a denial of service condition or execute arbitrary code on an affected system. |
IPS will detect and block malformed IMAP commands sent to the server.
In order for the protection to be activated, update your product to the latest update. For information on how to update , go to SBP-2006-05, Protection tab and select the version of your choice.
SmartView Tracker will log the following entries:
Attack Name: IMAP Protocol Violation
Attack Information: Microsoft Exchange Server IMAP command denial of service (MS07-026)