Microsoft Security Bulletin MS16-108 - Critical
Security Update for Microsoft Exchange Server (3185883)
Published: September 13, 2016
Version: 1.0
Executive Summary
This security update resolves vulnerabilities in Microsoft Exchange Server. The most severe of the vulnerabilities could allow remote code execution in some Oracle Outside In libraries that are built into Exchange Server if an attacker sends an email with a specially crafted attachment to a vulnerable Exchange server.
This security update is rated Critical for all supported editions of Microsoft Exchange Server 2007, Microsoft Exchange Server 2010, Microsoft Exchange Server 2013, and Microsoft Exchange Server 2016. For more information, see the Affected Software and Vulnerability Severity Ratings section.
The security update addresses the vulnerabilities by correcting how Microsoft Exchange:
- parses certain unstructured file formats.
- handles open redirect requests.
- handles Microsoft Outlook meeting invitation requests.
For more information about the vulnerabilities, see the Vulnerability Information section.
For more information about this update, see Microsoft Knowledge Base Article 3185883.
Affected Software and Vulnerability Severity Ratings
The following software versions or editions are affected. Versions or editions that are not listed are either past their support life cycle or are not affected. To determine the support life cycle for your software version or edition, see Microsoft Support Lifecycle.
The severity ratings indicated for each affected software assume the potential maximum impact of the vulnerability. For information regarding the likelihood, within 30 days of this security bulletin’s release, of the exploitability of the vulnerability in relation to its severity rating and security impact, please see the Exploitability Index in the September bulletin summary.
**Microsoft Server Software** | [**Microsoft Exchange Information Disclosure Vulnerability - CVE-2016-0138**](http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-0138) | [**Microsoft Exchange Open Redirect Vulnerability - CVE-2016-3378**](http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-3378) | [**Microsoft Exchange Elevation of Privilege Vulnerability - CVE-2016-3379**](http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-3379) | **Updates Replaced\*** | |
**Microsoft Exchange Server 2007** | |||||
[Microsoft Exchange Server 2007 Service Pack 3](https://www.microsoft.com/download/details.aspx?familyid=7346ee80-aa1d-4a74-abdf-40ba864eebc8) (3184711) | **Important** Information Disclosure | Not applicable | Not applicable | 3151086 in [MS16-079](http://go.microsoft.com/fwlink/?linkid=787067) | |
**Microsoft Exchange Server 2010** | |||||
[Microsoft Exchange Server 2010 Service Pack 3](https://www.microsoft.com/download/details.aspx?familyid=4d9bd5bb-34e8-49b8-9ae8-3275230e1c1d) (3184728) | **Important** Information Disclosure | Not applicable | Not applicable | 3151097 in [MS16-079](http://go.microsoft.com/fwlink/?linkid=787067) | |
**Microsoft Exchange Server 2013** | |||||
[Microsoft Exchange Server 2013 Service Pack 1](https://www.microsoft.com/download/details.aspx?familyid=9c8e9062-2c83-46d2-85fe-af4fe80d96e1) (3184736) | **Important** Information Disclosure | **Moderate** Spoofing | Not applicable | 3150501 in [MS16-079](http://go.microsoft.com/fwlink/?linkid=787067) | |
[Microsoft Exchange Server 2013 Cumulative Update 12](https://www.microsoft.com/download/details.aspx?familyid=0b5ea115-8dd3-4827-90c2-755cf0dec607) (3184736) | **Important** Information Disclosure | **Moderate** Spoofing | Not applicable | 3150501 in [MS16-079](http://go.microsoft.com/fwlink/?linkid=787067) | |
[Microsoft Exchange Server 2013 Cumulative Update 13](https://www.microsoft.com/download/details.aspx?familyid=e980fdd6-6643-4ebd-b64d-bef3da2a7bb9) (3184736) | **Important** Information Disclosure | **Moderate** Spoofing | Not applicable | None | |
**Microsoft Exchange Server 2016** | |||||
[Microsoft Exchange Server 2016 Cumulative Update 1](https://www.microsoft.com/download/details.aspx?familyid=6b407e49-79b7-450c-9278-315cfec23c1b) (3184736) | **Important** Information Disclosure | **Moderate** Spoofing | **Important** Elevation of Privilege | 3150501 in [MS16-079](http://go.microsoft.com/fwlink/?linkid=787067) | |
[Microsoft Exchange Server 2016 Cumulative Update 2](https://www.microsoft.com/download/details.aspx?familyid=03364ca1-8a4b-4a81-8790-117ce2e4ed34) (3184736) | **Important** Information Disclosure | **Moderate** Spoofing | **Important** Elevation of Privilege | None |
Oracle Outside In Libraries Vulnerabilities
This security update addresses the following vulnerabilities, which are described in Oracle Critical Patch Update Advisory – July 2016:
Remote Code Execution: CVE-2016-3575, CVE-2016-3581, CVE-2016-3582, CVE-2016-3583, CVE-2016-3595, CVE-2016-3594, CVE-2015-6014, CVE-2016-3593, CVE-2016-3592, CVE-2016-3596, CVE-2016-3591
Information Disclosure: CVE-2016-3574
Denial of Service: CVE-2016-3576, CVE-2016-3577, CVE-2016-3578, CVE-2016-3579, CVE-2016-3580, CVE-2016-3590
**Operating System** | **Aggregate Severity and Impact** | **Updates Replaced** |
**Microsoft Exchange Server 2007** | ||
[Microsoft Exchange Server 2007 Service Pack 3](https://www.microsoft.com/download/details.aspx?familyid=7346ee80-aa1d-4a74-abdf-40ba864eebc8) (3184711) | **Critical** Remote Code Execution | 3151086 in [MS16-079](http://go.microsoft.com/fwlink/?linkid=787067) |
**Microsoft Exchange Server 2010** | ||
[Microsoft Exchange Server 2010 Service Pack 3](https://www.microsoft.com/download/details.aspx?familyid=4d9bd5bb-34e8-49b8-9ae8-3275230e1c1d) (3184728) | **Critical** Remote Code Execution | 3151097 in [MS16-079](http://go.microsoft.com/fwlink/?linkid=787067) |
**Microsoft Exchange Server 2013** | ||
[Microsoft Exchange Server 2013 Service Pack 1](https://www.microsoft.com/download/details.aspx?familyid=9c8e9062-2c83-46d2-85fe-af4fe80d96e1) (3184736) | **Critical** Remote Code Execution | 3150501 in [MS16-079](http://go.microsoft.com/fwlink/?linkid=787067) |
[Microsoft Exchange Server 2013 Cumulative Update 12](https://www.microsoft.com/download/details.aspx?familyid=0b5ea115-8dd3-4827-90c2-755cf0dec607) (3184736) | **Critical** Remote Code Execution | 3150501 in [MS16-079](http://go.microsoft.com/fwlink/?linkid=787067) |
[Microsoft Exchange Server 2013 Cumulative Update 13](https://www.microsoft.com/download/details.aspx?familyid=e980fdd6-6643-4ebd-b64d-bef3da2a7bb9) (3184736) | **Critical** Remote Code Execution | None |
**Microsoft Exchange Server 2016** | ||
[Microsoft Exchange Server 2016 Cumulative Update 1](https://www.microsoft.com/download/details.aspx?familyid=6b407e49-79b7-450c-9278-315cfec23c1b) (3184736) | **Critical** Remote Code Execution | 3150501 in [MS16-079](http://go.microsoft.com/fwlink/?linkid=787067) |
[Microsoft Exchange Server 2016 Cumulative Update 2](https://www.microsoft.com/download/details.aspx?familyid=03364ca1-8a4b-4a81-8790-117ce2e4ed34) (3184736) | **Critical** Remote Code Execution | None |
Update FAQ
Why is Microsoft issuing a security update for vulnerabilities that are in third-party code, Oracle Outside In libraries?
Microsoft licenses a custom implementation of the Oracle Outside In libraries, specific to the product in which the third-party code is used. Microsoft is issuing this security update to help ensure that all customers using this third-party code in Microsoft Exchange are protected from these vulnerabilities. For more information about these vulnerabilities, see Oracle Critical Patch Update Advisory – July 2016.
Vulnerability Information
Microsoft Exchange Information Disclosure Vulnerability – CVE-2016-0138
An information disclosure vulnerability exists in the way that Microsoft Exchange Server parses email messages. The vulnerability could allow an attacker to discover confidential user information that is contained in Microsoft Outlook applications.
To exploit the vulnerability, an attacker could use "send as" rights to send a specially crafted message to a user.
The security update addresses the vulnerabilities by correcting how Microsoft Exchange parses certain unstructured file formats.
The following table contains links to the standard entry for each vulnerability in the Common Vulnerabilities and Exposures list:
Vulnerability title | CVE number | Publicly disclosed | Exploited |
Microsoft Exchange Information Disclosure Vulnerability | CVE-2016-0138 | No | No |
Vulnerability title | CVE number | Publicly disclosed | Exploited |
Microsoft Exchange Open Redirect Vulnerability | CVE-2016-3378 | No | No |
Vulnerability title | CVE number | Publicly disclosed | Exploited |
Microsoft Exchange Elevation of Privilege Vulnerability | CVE-2016-3379 | No | No |