what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

ms02-012

ms02-012
Posted Mar 4, 2002

Microsoft Security Advisory MS02-012 - The Windows 2000 mail server, Exchange 2000, has a denial of service vulnerability which allows remote attackers to stop the service. Microsoft FAQ on this issue available here.

tags | remote, denial of service
systems | windows
SHA-256 | 153a883ababdef694da321c2bf0472884fc0224d83e8a9d48ca3d60c87799db4

ms02-012

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----

- ----------------------------------------------------------------------
Title: Malformed Data Transfer Request can Cause Windows SMTP
Service to Fail
Date: 27 February 2002
Software: Microsoft Windows 2000; Microsoft Windows XP Professional
Microsoft Exchange 2000
Impact: Denial of Service
Max Risk: Low
Bulletin: MS02-012

Microsoft encourages customers to review the Security Bulletin at:
http://www.microsoft.com/technet/security/bulletin/MS02-012.asp.
- ----------------------------------------------------------------------

Issue:
======
An SMTP service installs by default as part of Windows 2000 server
products. Exchange 2000, which can only be installed on Windows 2000,
uses the native Windows 2000 SMTP service rather than providing its
own. In addition, Windows 2000 and Windows XP workstation products
provide an SMTP service that is not installed by default. All of
these implementations contain a flaw that could enable denial of
service attacks to be mounted against the service.

The flaw involves how the service handles a particular type of SMTP
command used to transfer the data that constitutes an incoming
mail. By sending a malformed version of this command, an attacker
could cause the SMTP service to fail. This would have the effect
of disrupting mail services on the affected system, but would not
cause the operating system itself to fail.

Mitigating Factors:
====================
- Windows XP Home Edition does not provide an SMTP service, and
is not affected by the vulnerability.

- Windows 2000 Professional and Windows XP Professional do provide
an SMTP service, but it is not installed by default.

- Windows 2000 server products do install the SMTP service by
default. However, best practices recommend disabling any
unneeded services, and systems on which the SMTP service had been
disabled would not be at risk.

- Exchange 5.5, even if installed on a Windows 2000 server, is not
affected by the vulnerability.

- The result of an attack would be limited to disrupting the SMTP
service and, depending on the system configuration, potentially
IIS and other internet services as well. However, it would not
disrupt any other system functions.

- The vulnerability would not enable an attacker to gain any
privileges on the affected system or to access users' email or
data.

Risk Rating:
============
- Internet systems: Low
- Intranet systems: Low
- Client systems: Low

Patch Availability:
===================
- A patch is available to fix this vulnerability. Please read the
Security Bulletin at
http://www.microsoft.com/technet/security/bulletin/ms02-012.asp
for information on obtaining this patch.

Acknowledgment:
===============
- H D Moore (hdm@secureaustin.com)

- ---------------------------------------------------------------------

THE INFORMATION PROVIDED IN THE MICROSOFT KNOWLEDGE BASE IS
PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND. MICROSOFT DISCLAIMS
ALL
WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING THE
WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.
IN NO EVENT
SHALL MICROSOFT CORPORATION OR ITS SUPPLIERS BE LIABLE FOR ANY
DAMAGES
WHATSOEVER INCLUDING DIRECT, INDIRECT, INCIDENTAL, CONSEQUENTIAL,
LOSS OF
BUSINESS PROFITS OR SPECIAL DAMAGES, EVEN IF MICROSOFT CORPORATION OR
ITS
SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. SOME
STATES DO
NOT ALLOW THE EXCLUSION OR LIMITATION OF LIABILITY FOR CONSEQUENTIAL
OR
INCIDENTAL DAMAGES SO THE FOREGOING LIMITATION MAY NOT APPLY.

-----BEGIN PGP SIGNATURE-----
Version: PGP 7.1

iQEVAwUBPH2VtY0ZSRQxA/UrAQFqjAgAhoe9Ryd4VWtJ/AvFSct50vx42qKE1vUW
ai/uDPZpV2m5BiA0wDWgeNVkwqdYeOpuw5XW5usl53YkgE45AY943dBViSlUOzgj
3P1nChUPgrvtAaMvZYJLtm0iQWK0oz2Qq/zAtHVDr339KAYmOi1PBC/cdx6+ZBmj
cHYYLwbFQMtLc2ezB7SE9u+ky3VtptSHfGUvA1Nq5GwmnMPHmw4+pCYyhgAkJD+R
IfMMovinlh4zB2ewGzZ5M77ffrHhZDHhn5TyEnxPx7RXzsR7NqThEoanCc4Nbzw1
5f51sRwy1iayafAIFLpqw+iODXa9pfjbzVrxAQcleIEar9z+JM65zQ==
=kDRR
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    0 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close