Microsoft Exchange Server 2016 Cumulative Update 18

CPE Details

Microsoft Exchange Server 2016 Cumulative Update 18
2016
2021-01-19
21h49 +00:00
2021-01-19
21h49 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_18:*:*:*:*:*:*

Informations

Vendor

microsoft

Product

exchange_server

Version

2016

Update

cumulative_update_18

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2024-49040 2024-11-12
17h53 +00:00
Microsoft Exchange Server Spoofing Vulnerability
7.5
High
CVE-2024-26198 2024-03-12
16h57 +00:00
Microsoft Exchange Server Remote Code Execution Vulnerability
8.8
High
CVE-2023-36777 2023-09-12
16h58 +00:00
Microsoft Exchange Server Information Disclosure Vulnerability
5.7
Medium
CVE-2023-21709 2023-08-08
17h08 +00:00
Microsoft Exchange Server Elevation of Privilege Vulnerability
9.8
Critical
CVE-2021-27065 2021-03-02
23h55 +00:00
Microsoft Exchange Server Remote Code Execution Vulnerability
7.8
High
CVE-2021-26858 2021-03-02
23h55 +00:00
Microsoft Exchange Server Remote Code Execution Vulnerability
7.8
High
CVE-2021-26855 2021-03-02
23h55 +00:00
Microsoft Exchange Server Remote Code Execution Vulnerability
9.8
Critical
CVE-2021-26857 2021-03-02
23h55 +00:00
Microsoft Exchange Server Remote Code Execution Vulnerability
7.8
High
CVE-2021-27078 2021-03-02
22h55 +00:00
Microsoft Exchange Server Remote Code Execution Vulnerability
9.1
Critical
CVE-2021-26854 2021-03-02
22h55 +00:00
Microsoft Exchange Server Remote Code Execution Vulnerability
7.2
High
CVE-2021-26412 2021-03-02
22h55 +00:00
Microsoft Exchange Server Remote Code Execution Vulnerability
9.1
Critical
CVE-2021-24085 2021-02-25
22h01 +00:00
Microsoft Exchange Server Spoofing Vulnerability
6.5
Medium
CVE-2021-1730 2021-02-25
22h01 +00:00

A spoofing vulnerability exists in Microsoft Exchange Server which could result in an attack that would allow a malicious actor to impersonate the user.

This update addresses this vulnerability.

To prevent these types of attacks, Microsoft recommends customers to download inline images from different DNSdomains than the rest of OWA. Please see further instructions in the FAQ to put in place this mitigations.

5.4
Medium
CVE-2020-17142 2020-12-09
22h36 +00:00
Microsoft Exchange Remote Code Execution Vulnerability
9.1
Critical
CVE-2020-17143 2020-12-09
22h36 +00:00
Microsoft Exchange Server Information Disclosure Vulnerability
8.8
High
CVE-2020-17141 2020-12-09
22h36 +00:00
Microsoft Exchange Remote Code Execution Vulnerability
8.4
High
CVE-2020-17132 2020-12-09
22h36 +00:00
Microsoft Exchange Remote Code Execution Vulnerability
9.1
Critical
CVE-2020-17117 2020-12-09
22h36 +00:00
Microsoft Exchange Remote Code Execution Vulnerability
7.2
High
CVE-2020-17084 2020-11-11
05h48 +00:00
Microsoft Exchange Server Remote Code Execution Vulnerability
8.8
High
CVE-2020-17085 2020-11-11
05h48 +00:00
Microsoft Exchange Server Denial of Service Vulnerability
6.2
Medium
CVE-2020-17083 2020-11-11
05h48 +00:00
Microsoft Exchange Server Remote Code Execution Vulnerability
5.5
Medium
CVE-2020-16969 2020-10-16
20h18 +00:00

An information disclosure vulnerability exists in how Microsoft Exchange validates tokens when handling certain messages. An attacker who successfully exploited the vulnerability could use this to gain further information from a user.

To exploit the vulnerability, an attacker could include specially crafted OWA messages that could be loaded, without warning or filtering, from the attacker-controlled URL. This callback vector provides an information disclosure tactic used in web beacons and other types of tracking systems.

The security update corrects the way that Exchange handles these token validations.

7.1
High
CVE-2017-11940 2017-12-08
14h00 +00:00
The Microsoft Malware Protection Engine running on Microsoft Forefront and Microsoft Defender on Windows 7 SP1, Windows 8.1, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, 1709 and Windows Server 2016, Windows Server, version 1709, Microsoft Exchange Server 2013 and 2016, does not properly scan a specially crafted file leading to remote code execution. aka "Microsoft Malware Protection Engine Remote Code Execution Vulnerability". This is different than CVE-2017-11937.
7.8
High
CVE-2017-11937 2017-12-07
17h00 +00:00
The Microsoft Malware Protection Engine running on Microsoft Forefront and Microsoft Defender on Windows 7 SP1, Windows 8.1, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, 1709 and Windows Server 2016, Windows Server, version 1709, Microsoft Exchange Server 2013 and 2016, does not properly scan a specially crafted file leading to remote code execution. aka "Microsoft Malware Protection Engine Remote Code Execution Vulnerability".
7.8
High
CVE-2017-8538 2017-05-26
18h00 +00:00
The Microsoft Malware Protection Engine running on Microsoft Forefront and Microsoft Defender on Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016, Microsoft Exchange Server 2013 and 2016, does not properly scan a specially crafted file leading to memory corruption. aka "Microsoft Malware Protection Engine Remote Code Execution Vulnerability", a different vulnerability than CVE-2017-8540 and CVE-2017-8541.
7.8
High
CVE-2017-8539 2017-05-26
18h00 +00:00
The Microsoft Malware Protection Engine running on Microsoft Forefront and Microsoft Defender on Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016, Microsoft Exchange Server 2013 and 2016, does not properly scan a specially crafted file leading to denial of service. aka "Microsoft Malware Protection Engine Denial of Service Vulnerability", a different vulnerability than CVE-2017-8535, CVE-2017-8536, CVE-2017-8537, and CVE-2017-8542.
5.5
Medium
CVE-2017-8541 2017-05-26
18h00 +00:00
The Microsoft Malware Protection Engine running on Microsoft Forefront and Microsoft Defender on Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016, Microsoft Exchange Server 2013 and 2016, does not properly scan a specially crafted file leading to memory corruption. aka "Microsoft Malware Protection Engine Remote Code Execution Vulnerability", a different vulnerability than CVE-2017-8538 and CVE-2017-8540.
7.8
High
CVE-2017-8542 2017-05-26
18h00 +00:00
The Microsoft Malware Protection Engine running on Microsoft Forefront and Microsoft Defender on Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016, Microsoft Exchange Server 2013 and 2016, does not properly scan a specially crafted file leading to denial of service. aka "Microsoft Malware Protection Engine Denial of Service Vulnerability", a different vulnerability than CVE-2017-8535, CVE-2017-8536, CVE-2017-8537, and CVE-2017-8539.
5.5
Medium
CVE-2016-0028 2016-06-15
23h00 +00:00
Outlook Web Access (OWA) in Microsoft Exchange Server 2013 SP1, Cumulative Update 11, and Cumulative Update 12 and 2016 Gold and Cumulative Update 1 does not properly restrict loading of IMG elements, which makes it easier for remote attackers to track users via a crafted HTML e-mail message, aka "Microsoft Exchange Information Disclosure Vulnerability."
5.5
Medium
CVE-2012-2284 2012-10-18
15h00 +00:00
The (1) install and (2) upgrade processes in EMC NetWorker Module for Microsoft Applications (NMM) 2.2.1, 2.3 before build 122, and 2.4 before build 375, when Exchange Server is used, allow local users to read cleartext administrator credentials via unspecified vectors.
2.1
CVE-2011-0290 2011-10-21
08h00 +00:00
The BlackBerry Collaboration Service in Research In Motion (RIM) BlackBerry Enterprise Server (BES) 5.0.3 through MR4 for Microsoft Exchange and Lotus Domino allows remote authenticated users to log into arbitrary user accounts associated with the same organization, and send messages, read messages, read contact lists, or cause a denial of service (login unavailability), via unspecified vectors.
6.5
CVE-1999-1322 2001-09-12
02h00 +00:00
The installation of 1ArcServe Backup and Inoculan AV client modules for Exchange create a log file, exchverify.log, which contains usernames and passwords in plaintext.
4.6
CVE-2000-0216 2000-03-22
04h00 +00:00
Microsoft email clients in Outlook, Exchange, and Windows Messaging automatically respond to Read Receipt and Delivery Receipt tags, which could allow an attacker to flood a mail system with responses by forging a Read Receipt request that is redirected to a large distribution list.
5