Computer Security
[EN] securityvulns.ru no-pyccku


Related information

  DoS против Exchange

  RE: Re[3]: Possible Exchange 5.5 Server DoS [msrc 421]

  Re: Possible Exchange 5.5 Server DoS

  Possible Exchange 5.5 Server DoS

From:MICROSOFT <secure_(at)_microsoft.com>
Date:01.11.2000
Subject:Security Bulletin (MS00-082)

Microsoft Security Bulletin (MS00-082)
- --------------------------------------

Patch Available for "Malformed MIME Header" Vulnerability

Originally posted: October 31, 2000

Summary
=======
Microsoft has released a patch that eliminates a security
vulnerability in Microsoft(r) Exchange Server 5.5. The  vulnerability
could enable a malicious user to cause an Exchange server to fail.

Frequently asked questions regarding this vulnerability
and the patch can be found at
http://www.microsoft.com/technet/security/bulletin/fq00-082.asp

Issue
=====
As part of its normal processing of incoming mails, Exchange server
checks for invalid values in the MIME header fields.  However, if a
particular type of invalid value is present in certain fields, the
Exchange service will fail. Normal  operations can be restored by
restarting the Exchange service and deleting the offending mail.

There is no capability via this vulnerability to add, delete or
modify emails, nor is there any capability to usurp  administrative
privileges on the server. The vulnerability can be eliminated either
by apply the patch or Exchange 5.5  Service Pack 4, which is due to
be released shortly. Exchange 2000 is not affected by the
vulnerability.

Affected Software Versions
==========================
- Microsoft Exchange Server 5.5

Note: Exchange Server 2000 is not affected by the vulnerability.

Patch Availability
==================
- Microsoft Exchange Server 5.5:
  http://www.microsoft.com/Downloads/Release.asp?ReleaseID=25443

Note: This patch can be applied atop systems running Exchange Server
5.5 Service Pack 3. It is included in Exchange Server  5.5 Service
Pack 4.

Note: Additional security patches are available at the Microsoft
Download Center

More Information
================
Please see the following references for more information related to
this issue.
- Frequently Asked Questions: Microsoft Security Bulletin MS00-082,
  http://www.microsoft.com/technet/security/bulletin/fq00-082.asp
- Microsoft Knowledge Base article Q275714 discusses this issue
  and will be available soon.
- Microsoft TechNet Security web site,
  http://www.microsoft.com/technet/security/default.asp

Obtaining Support on this Issue
===============================
This is a fully supported patch. Information on contacting Microsoft
Product Support Services is available at
http://support.microsoft.com/support/contact/default.asp.

Acknowledgments
===============
Microsoft thanks  Art Savelev (http://www.savelev.com) for reporting
this issue to us and working with us to protect  customers.

Revisions
=========
- October 31, 2000: Bulletin Created.

- -------------------------------------------------------

THE INFORMATION PROVIDED IN THE MICROSOFT KNOWLEDGE BASE IS PROVIDED
"AS IS" WITHOUT WARRANTY OF ANY KIND. MICROSOFT  DISCLAIMS ALL
WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING THE WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR  PURPOSE. IN NO EVENT
SHALL MICROSOFT CORPORATION OR ITS SUPPLIERS BE LIABLE FOR ANY
DAMAGES WHATSOEVER INCLUDING DIRECT,  INDIRECT, INCIDENTAL,
CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR SPECIAL DAMAGES, EVEN IF
MICROSOFT CORPORATION OR ITS  SUPPLIERS HAVE BEEN ADVISED OF THE
POSSIBILITY OF SUCH DAMAGES. SOME STATES DO NOT ALLOW THE EXCLUSION
OR LIMITATION OF  LIABILITY FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES
SO THE FOREGOING LIMITATION MAY NOT APPLY.

Last Updated October 31, 2000

(c) 2000 Microsoft Corporation. All rights reserved. Terms of use.

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod