SB2023080867 - Multiple vulnerabilities in Microsoft Exchange Server
Published: August 8, 2023 Updated: December 8, 2023
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 5 secuirty vulnerabilities.
1) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2023-21709)
The vulnerability allows a remote attacker to escalate privileges on the system.
The vulnerability exists due to application does not properly impose security restrictions in Microsoft Exchange Server. A remote attacker can perform a brute-force attack, which leads to security restrictions bypass and privilege escalation.
2) Input validation error (CVE-ID: CVE-2023-35388)
The vulnerability allows a remote attacker to execute arbitrary code on the system.
The vulnerability exists due to insufficient validation of user-supplied input in Microsoft Exchange Server. A remote user can pass specially crafted input to the application and execute arbitrary code on the system.
3) Input validation error (CVE-ID: CVE-2023-38182)
The vulnerability allows a remote attacker to execute arbitrary code on the system.
The vulnerability exists due to insufficient validation of user-supplied input in Microsoft Exchange Server. A remote user on the local network can pass specially crafted input to the application and execute arbitrary code on the system.
4) Spoofing attack (CVE-ID: CVE-2023-38181)
The vulnerability allows a remote attacker to perform spoofing attack.
The vulnerability exists due to incorrect processing of user-supplied data in Microsoft Exchange Server. A remote user can spoof page content.
5) Input validation error (CVE-ID: CVE-2023-38185)
The vulnerability allows a remote attacker to execute arbitrary code on the system.
The vulnerability exists due to insufficient validation of user-supplied input in Microsoft Exchange Server. A remote user can pass specially crafted input to the application and execute arbitrary code on the system.
Remediation
Install update from vendor's website.
References
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-21709
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-35388
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-38182
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-38181
- https://www.zerodayinitiative.com/advisories/ZDI-23-1646/
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-38185