Rule

--
Sid
3-15302

--
Summary:
This event is generated when an attempt is made to exploit a known vulnerability in Microsoft Exchange.

--
Impact:
Unknown.

--
Detailed Information:
The Electronic Messaging System Microsoft Data Base (EMSMDB32) provider in Microsoft Exchange 2000 Server SP3 and Exchange Server 2003 SP2, as used in Exchange System Attendant, allows remote attackers to cause a denial of service (application outage) via a malformed MAPI command, aka "Literal Processing Vulnerability."

WARNING
In order to avoid potential evasion techniques, http_inspect should be configured with "flow_depth 0" so that all HTTP server response traffic is inspected.
 
Setting flow_depth 0 will cause performance problems in some situations.
WARNING

--
Affected Systems:
Microsoft Exchange Server 2000 SP3  
Microsoft Exchange Server 2003 SP2  
Microsoft Exchange Server 2007 SP1  
  

--
Attack Scenarios:
The attacker needs to send malformed MAPI commands to the server.

--
Ease of Attack:
Difficult.

--
False Positives:
None known.

--
False Negatives:
None known.

--
Corrective Action:
Upgrade to the latest non-affected version of the software.

Apply the appropriate vendor supplied patches.

--
Contributors:
Sourcefire Vulnerability Research Team
This document was generated from data supplied by the National Vulnerability Database. A product of the National Institute of Standards and Technology.
For more information see http://nvd.nist.gov/

--
Additional References:

NIST CVE-2009-0099:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2009-0099
  
--
