{"vuid":"VU#343145","idnumber":"343145","name":"Microsoft Exchange Server fails to properly decode MIME email messages","keywords":["Microsoft","Exchange Server","remote code execution","crafted email messages","ms07-may"],"overview":"Microsoft Exchange Server contains a remote code execution vulnerability that could enable an attacker to execute arbitrary code and gain complete control of the vulnerable system.","clean_desc":"Microsoft Exchange Server fails to properly process MIME messages. When an email message containing base64 encoded content is opened, Microsoft Exchange Server does not properly decode the base64 content. An attacker could send a specially crafted email that, when opened, could allow the attacker to execute arbitrary code. The attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.","impact":"By sending a specially crafted email message to a Microsoft Exchange Server, a remote, unauthenticated attacker could execute arbitrary code on the server.","resolution":"Microsoft addresses this vulnerability with the updates listed in Microsoft Security Bulletin MS07-026.","workarounds":"","sysaffected":"","thanks":"","author":"This document was written by Joseph W Pruszynski.","public":["http://www.microsoft.com/technet/security/bulletin/ms07-026.mspx","http://secunia.com/advisories/25183/"],"cveids":["CVE-2007-0213"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2007-05-08T18:05:39Z","publicdate":"2007-05-08T00:00:00Z","datefirstpublished":"2007-05-08T21:13:53Z","dateupdated":"2007-05-09T17:37:19Z","revision":15,"vrda_d1_directreport":"0","vrda_d1_population":"4","vrda_d1_impact":"4","cam_widelyknown":"15","cam_exploitation":"15","cam_internetinfrastructure":"10","cam_population":"20","cam_impact":"17","cam_easeofexploitation":"15","cam_attackeraccessrequired":"18","cam_scorecurrent":"68.85","cam_scorecurrentwidelyknown":"77.45625","cam_scorecurrentwidelyknownexploited":"86.0625","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":68.85,"vulnote":null}