Risk | High |
Patch available | YES |
Number of vulnerabilities | 18 |
CVE-ID | CVE-2016-3575 CVE-2016-3581 CVE-2016-3582 CVE-2016-3583 CVE-2016-3595 CVE-2016-3594 CVE-2015-6014 CVE-2016-3593 CVE-2016-3592 CVE-2016-3596 CVE-2016-3591 CVE-2016-3574 CVE-2016-3576 CVE-2016-3577 CVE-2016-3578 CVE-2016-3579 CVE-2016-3580 CVE-2016-3590 |
CWE-ID | CWE-264 CWE-200 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software |
Microsoft Exchange Server Server applications / Mail servers |
Vendor | Microsoft |
Security Bulletin
This security bulletin contains information about 18 vulnerabilities.
EUVDB-ID: #VU2625
Risk: High
CVSSv4.0: 5.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:L/VA:L/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2016-3575
CWE-ID:
CWE-264 - Permissions, Privileges, and Access Controls
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The weakness exists due to a flaw in the Outside In Technology Outside In Filters component. A remote attacker can execute arbitrary code with privileges of the current user.
Install update from Microsoft website
Vulnerable software versionsMicrosoft Exchange Server: 2007 - 2016 RTM 15.01.0225.042
CPE2.3https://technet.microsoft.com/en-us/library/security/ms16-108.aspx
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
How the attacker can exploit this vulnerability?
The attacker would have to send a specially crafted request to the affected application in order to exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU2631
Risk: High
CVSSv4.0: 5.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:L/VA:L/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2016-3581
CWE-ID:
CWE-264 - Permissions, Privileges, and Access Controls
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The weakness exists due to a flaw in the Outside In Technology Outside In Filters component. A remote attacker can execute arbitrary code with privileges of the current user.
Install update from Microsoft website
Vulnerable software versionsMicrosoft Exchange Server: 2007 - 2016 RTM 15.01.0225.042
CPE2.3https://technet.microsoft.com/en-us/library/security/ms16-108.aspx
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
How the attacker can exploit this vulnerability?
The attacker would have to send a specially crafted request to the affected application in order to exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU2632
Risk: High
CVSSv4.0: 5.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:L/VA:L/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2016-3582
CWE-ID:
CWE-264 - Permissions, Privileges, and Access Controls
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The weakness exists due to a flaw in the Outside In Technology Outside In Filters component. A remote attacker can execute arbitrary code with privileges of the current user.
Install update from Microsoft website
Vulnerable software versionsMicrosoft Exchange Server: 2007 - 2016 RTM 15.01.0225.042
CPE2.3https://technet.microsoft.com/en-us/library/security/ms16-108.aspx
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
How the attacker can exploit this vulnerability?
The attacker would have to send a specially crafted request to the affected application in order to exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU2633
Risk: High
CVSSv4.0: 5.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:L/VA:L/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2016-3583
CWE-ID:
CWE-264 - Permissions, Privileges, and Access Controls
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The weakness exists due to a flaw in the Outside In Technology Outside In Filters component. A remote attacker can execute arbitrary code with privileges of the current user.
Install update from Microsoft website
Vulnerable software versionsMicrosoft Exchange Server: 2007 - 2016 RTM 15.01.0225.042
CPE2.3https://technet.microsoft.com/en-us/library/security/ms16-108.aspx
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
How the attacker can exploit this vulnerability?
The attacker would have to send a specially crafted request to the affected application in order to exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU2639
Risk: High
CVSSv4.0: 5.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:L/VA:L/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2016-3595
CWE-ID:
CWE-264 - Permissions, Privileges, and Access Controls
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The weakness exists due to a flaw in the Outside In Technology Outside In Filters component. A remote attacker can execute arbitrary code with privileges of the current user.
Install update from Microsoft website
Vulnerable software versionsMicrosoft Exchange Server: 2007 - 2016 RTM 15.01.0225.042
CPE2.3https://technet.microsoft.com/en-us/library/security/ms16-108.aspx
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
How the attacker can exploit this vulnerability?
The attacker would have to send a specially crafted request to the affected application in order to exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU2638
Risk: High
CVSSv4.0: 5.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:L/VA:L/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2016-3594
CWE-ID:
CWE-264 - Permissions, Privileges, and Access Controls
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The weakness exists due to a flaw in the Outside In Technology Outside In Filters component. A remote attacker can execute arbitrary code with privileges of the current user.
Install update from Microsoft website
Vulnerable software versionsMicrosoft Exchange Server: 2007 - 2016 RTM 15.01.0225.042
CPE2.3https://technet.microsoft.com/en-us/library/security/ms16-108.aspx
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
How the attacker can exploit this vulnerability?
The attacker would have to send a specially crafted request to the affected application in order to exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU3159
Risk: High
CVSSv4.0: 5.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:L/VA:L/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2015-6014
CWE-ID:
CWE-264 - Permissions, Privileges, and Access Controls
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The weakness exists due to a flaw in the Outside In Technology Outside In Filters component. A remote attacker can execute arbitrary code with privileges of the current user.
Install update from Microsoft website
Vulnerable software versionsMicrosoft Exchange Server: 2007 - 2016 RTM 15.01.0225.042
CPE2.3https://technet.microsoft.com/en-us/library/security/ms16-108.aspx
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
How the attacker can exploit this vulnerability?
The attacker would have to send a specially crafted request to the affected application in order to exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU2637
Risk: High
CVSSv4.0: 5.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:L/VA:L/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2016-3593
CWE-ID:
CWE-264 - Permissions, Privileges, and Access Controls
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The weakness exists due to a flaw in the Outside In Technology Outside In Filters component. A remote attacker can execute arbitrary code with privileges of the current user.
Install update from Microsoft website
Vulnerable software versionsMicrosoft Exchange Server: 2007 - 2016 RTM 15.01.0225.042
CPE2.3https://technet.microsoft.com/en-us/library/security/ms16-108.aspx
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
How the attacker can exploit this vulnerability?
The attacker would have to send a specially crafted request to the affected application in order to exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU2636
Risk: High
CVSSv4.0: 5.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:L/VA:L/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2016-3592
CWE-ID:
CWE-264 - Permissions, Privileges, and Access Controls
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The weakness exists due to a flaw in the Outside In Technology Outside In Filters component. A remote attacker can execute arbitrary code with privileges of the current user.
Install update from Microsoft website
Vulnerable software versionsMicrosoft Exchange Server: 2007 - 2016 RTM 15.01.0225.042
CPE2.3https://technet.microsoft.com/en-us/library/security/ms16-108.aspx
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
How the attacker can exploit this vulnerability?
The attacker would have to send a specially crafted request to the affected application in order to exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU2640
Risk: High
CVSSv4.0: 5.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:L/VA:L/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2016-3596
CWE-ID:
CWE-264 - Permissions, Privileges, and Access Controls
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The weakness exists due to a flaw in the Outside In Technology Outside In Filters component. A remote attacker can execute arbitrary code with privileges of the current user.
Install update from Microsoft website
Vulnerable software versionsMicrosoft Exchange Server: 2007 - 2016 RTM 15.01.0225.042
CPE2.3https://technet.microsoft.com/en-us/library/security/ms16-108.aspx
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
How the attacker can exploit this vulnerability?
The attacker would have to send a specially crafted request to the affected application in order to exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU2635
Risk: High
CVSSv4.0: 5.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:L/VA:L/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2016-3591
CWE-ID:
CWE-264 - Permissions, Privileges, and Access Controls
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The weakness exists due to a flaw in the Outside In Technology Outside In Filters component. A remote attacker can execute arbitrary code with privileges of the current user.
Install update from Microsoft website
Vulnerable software versionsMicrosoft Exchange Server: 2007 - 2016 RTM 15.01.0225.042
CPE2.3https://technet.microsoft.com/en-us/library/security/ms16-108.aspx
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
How the attacker can exploit this vulnerability?
The attacker would have to send a specially crafted request to the affected application in order to exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU2624
Risk: Low
CVSSv4.0: 5.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:L/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2016-3574
CWE-ID:
CWE-200 - Information exposure
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.
The weakness exists due to a flaw in the Outside In Technology Outside In Filters component. A remote attacker can gain access to potentially sensitive data.
Install update from Microsoft website
Vulnerable software versionsMicrosoft Exchange Server: 2007 - 2016 RTM 15.01.0225.042
CPE2.3https://technet.microsoft.com/en-us/library/security/ms16-108.aspx
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
How the attacker can exploit this vulnerability?
The attacker would have to send a specially crafted request to the affected application in order to exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU2626
Risk: Low
CVSSv4.0: 5.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:L/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2016-3576
CWE-ID:
CWE-264 - Permissions, Privileges, and Access Controls
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to cause DoS conditions on the target system.
The weakness exists due to a flaw in the Outside In Technology Outside In Filters component. A remote attacker can access data, partially modify data, and partially deny service on the system.
Successful exploitation of the vulnerability may result in denial of service on the vulnerable system.
Install update from Microsoft website
Vulnerable software versionsMicrosoft Exchange Server: 2007 - 2016 RTM 15.01.0225.042
CPE2.3https://technet.microsoft.com/en-us/library/security/ms16-108.aspx
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
How the attacker can exploit this vulnerability?
The attacker would have to send a specially crafted request to the affected application in order to exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU2627
Risk: Low
CVSSv4.0: 5.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:L/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2016-3577
CWE-ID:
CWE-264 - Permissions, Privileges, and Access Controls
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to cause DoS conditions on the target system.
The weakness exists due to a flaw in the Outside In Technology Outside In Filters component. A remote attacker can access data, partially modify data, and partially deny service on the system.
Successful exploitation of the vulnerability may result in denial of service on the vulnerable system.
Install update from Microsoft website
Vulnerable software versionsMicrosoft Exchange Server: 2007 - 2016 RTM 15.01.0225.042
CPE2.3https://technet.microsoft.com/en-us/library/security/ms16-108.aspx
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
How the attacker can exploit this vulnerability?
The attacker would have to send a specially crafted request to the affected application in order to exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU2628
Risk: Low
CVSSv4.0: 5.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:L/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2016-3578
CWE-ID:
CWE-264 - Permissions, Privileges, and Access Controls
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to cause DoS conditions on the target system.
The weakness exists due to a flaw in the Outside In Technology Outside In Filters component. A remote attacker can access data, partially modify data, and partially deny service on the system.
Successful exploitation of the vulnerability may result in denial of service on the vulnerable system.
Install update from Microsoft website
Vulnerable software versionsMicrosoft Exchange Server: 2007 - 2016 RTM 15.01.0225.042
CPE2.3https://technet.microsoft.com/en-us/library/security/ms16-108.aspx
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
How the attacker can exploit this vulnerability?
The attacker would have to send a specially crafted request to the affected application in order to exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU2629
Risk: Low
CVSSv4.0: 5.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:L/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2016-3579
CWE-ID:
CWE-264 - Permissions, Privileges, and Access Controls
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to cause DoS conditions on the target system.
The weakness exists due to a flaw in the Outside In Technology Outside In Filters component. A remote attacker can access data, partially modify data, and partially deny service on the system.
Successful exploitation of the vulnerability may result in denial of service on the vulnerable system.
Install update from Microsoft website
Vulnerable software versionsMicrosoft Exchange Server: 2007 - 2016 RTM 15.01.0225.042
CPE2.3https://technet.microsoft.com/en-us/library/security/ms16-108.aspx
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
How the attacker can exploit this vulnerability?
The attacker would have to send a specially crafted request to the affected application in order to exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU2630
Risk: Low
CVSSv4.0: 5.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:L/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2016-3580
CWE-ID:
CWE-264 - Permissions, Privileges, and Access Controls
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to cause DoS conditions on the target system.
The weakness exists due to a flaw in the Outside In Technology Outside In Filters component. A remote attacker can access data, partially modify data, and partially deny service on the system.
Successful exploitation of the vulnerability may result in denial of service on the vulnerable system.
Install update from Microsoft website
Vulnerable software versionsMicrosoft Exchange Server: 2007 - 2016 RTM 15.01.0225.042
CPE2.3https://technet.microsoft.com/en-us/library/security/ms16-108.aspx
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
How the attacker can exploit this vulnerability?
The attacker would have to send a specially crafted request to the affected application in order to exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU2634
Risk: Low
CVSSv4.0: 5.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:L/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2016-3590
CWE-ID:
CWE-264 - Permissions, Privileges, and Access Controls
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to cause DoS conditions on the target system.
The weakness exists due to a flaw in the Outside In Technology Outside In Filters component. A remote attacker can access data, partially modify data, and partially deny service on the system.
Successful exploitation of the vulnerability may result in denial of service on the vulnerable system.
Install update from Microsoft website
Vulnerable software versionsMicrosoft Exchange Server: 2007 - 2016 RTM 15.01.0225.042
CPE2.3https://technet.microsoft.com/en-us/library/security/ms16-108.aspx
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
How the attacker can exploit this vulnerability?
The attacker would have to send a specially crafted request to the affected application in order to exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.