CVE-2010-1689

Severity

64%

Complexity

99%

Confidentiality

81%

The DNS implementation in smtpsvc.dll before 6.0.2600.5949 in Microsoft Windows 2000 SP4 and earlier, Windows XP SP3 and earlier, Windows Server 2003 SP2 and earlier, Windows Server 2008 SP2 and earlier, Windows Server 2008 R2, Exchange Server 2003 SP3 and earlier, Exchange Server 2007 SP2 and earlier, and Exchange Server 2010 uses predictable transaction IDs that are formed by incrementing a previous ID by 1, which makes it easier for man-in-the-middle attackers to spoof DNS responses, a different vulnerability than CVE-2010-0024 and CVE-2010-0025.

The DNS implementation in smtpsvc.dll before 6.0.2600.5949 in Microsoft Windows 2000 SP4 and earlier, Windows XP SP3 and earlier, Windows Server 2003 SP2 and earlier, Windows Server 2008 SP2 and earlier, Windows Server 2008 R2, Exchange Server 2003 SP3 and earlier, Exchange Server 2007 SP2 and earlier, and Exchange Server 2010 uses predictable transaction IDs that are formed by incrementing a previous ID by 1, which makes it easier for man-in-the-middle attackers to spoof DNS responses, a different vulnerability than CVE-2010-0024 and CVE-2010-0025.

CVSS 2.0 Base Score 6.4. CVSS Attack Vector: network. CVSS Attack Complexity: low. CVSS Vector: (AV:N/AC:L/Au:N/C:N/I:P/A:P).

Overview

Type

Microsoft

First reported 14 years ago

2010-05-07 18:30:00

Last updated 4 years ago

2020-04-09 13:25:00

Affected Software

Microsoft windows 2000_sp1

Microsoft windows 2000_sp2

Microsoft windows 2000_sp3

Microsoft Windows 2000 Service Pack 4

Microsoft Windows XP Service Pack 1

Microsoft Windows XP Service Pack 2

Microsoft Windows XP Service Pack 3

Microsoft Windows Server 2003 Service Pack 2

Microsoft Windows Server 2008 Service Pack 1

Microsoft Windows Server 2008 Service Pack 2

Microsoft Exchange Server 2003

2003

Microsoft Exchange Server 2003 Service Pack 1

2003

Microsoft Exchange Server 2003 Service Pack 2

2003

Microsoft Exchange Server 2007

2007

Microsoft Exchange Server 2007 Service Pack 1

2007

Microsoft Exchange Server 2010

2010

Stay updated

ExploitPedia is constantly evolving. Sign up to receive a notification when we release additional functionality.

Get in touch

If you'd like to report a bug or have any suggestions for improvements then please do get in touch with us using this form. We will get back to you as soon as we can.