CVE-2019-0586 RSS Back to forum
2
@christopher.low:
Unfortunately Microsoft has not disclosed any more details of the vulnerability than what is published in the security update guide, so we do not know how the exploit works or what the email contains exactly. We recommend that you install the update as soon as possible.
The update rollup can be found at:
https://support.microsoft.com/en-us/help/4471389/description-of-the-security-update-for-microsoft-exchange-server-2019
CVE-2019-0586
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0586
On this page
Executive Summary
Exploitability Assessment
Security Updates
Mitigations
Workarounds
FAQ
Acknowledgements
Disclaimer
Revisions
A remote code execution vulnerability exists in Microsoft Exchange software when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the System user. An attacker could then install programs; view, change, or delete data; or create new accounts.
Exploitation of the vulnerability requires that a specially crafted email be sent to a vulnerable Exchange server.
The security update addresses the vulnerability by correcting how Microsoft Exchange handles objects in memory.
---
Is vamsoft aware if we can block such mails or do they attack prior to spam filtering?