Critical updates for Exchange Server:
All supported Exchange Server versions contain a vulnerability that allows attackers to execute code on the Exchange Server using specially prepared mail.
Microsoft describes the problem here:
A remote code execution vulnerability exists in Microsoft Exchange software when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the System user. An attacker could then install programs; view, change, or delete data; or create new accounts.
Exploitation of the vulnerability requires that a specially crafted email be sent to a vulnerable Exchange server.
The security update addresses the vulnerability by correcting how Microsoft Exchange handles objects in memory.
A corresponding update for Exchange 2010, Exchange 2013 and Exchange 2016 is available. Click here to download the update:
- Microsoft Exchange Server 2016 Cumulative Update 9
- Microsoft Exchange Server 2016 Cumulative Update 8
- Microsoft Exchange Server 2013 Service Pack 1
- Microsoft Exchange Server 2013 Cumulative Update 20
- Microsoft Exchange Server 2013 Cumulative Update 19
- Microsoft Exchange Server 2010 Service Pack 3 Update Rollup 21
Even if no exploitation of the vulnerability is known yet, the update should be installed quickly.