Rapid7 Vulnerability & Exploit Database

Exchange SMTP Encapsulated Relay

Back to Search

Exchange SMTP Encapsulated Relay

Severity
5
CVSS
(AV:N/AC:L/Au:N/C:N/I:P/A:N)
Published
08/06/1999
Created
07/25/2018
Added
11/01/2004
Modified
03/21/2018

Description

Microsoft Exchange 4.x and 5.x allow a remote attacker to relay email (i.e. spam) using encapsulated SMTP addresses, even if the anti-relaying features are enabled.

An encapsulated address looks like this: IMCEASMTP-encapsulatedaddress@yourdomain.com

where encapsulatedaddress is the encoded destination email address. The encoding scheme is as follows: replace "@" with "+40", replace "." with "+2E".

Solution(s)

  • install-exchange-5_5-patch-postsp2-imcfix

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;