Skip navigation

Denial of Service in Exchange 2000 Server

Reported May 29, 2002, by Microsoft.

VERSION AFFECTED

 

·         Microsoft Exchange 2000 Server

 

DESCRIPTION

A Denial of Service (DoS) condition exists in Exchange 2000. This vulnerability stems from a problem in the way Exchange 2000 handles certain malformed Request for Comments (RFC) message attributes on received mail. An attacker can use these malformed messages to cause the Store service to consume 100 percent of CPU resources until the mail message is processed. Because the Exchange server still would have to process the malformed message, rebooting the server or restarting the service would have no effect on reducing the amount of consumed CPU resources.

VENDOR RESPONSE

The vendor, Microsoft, has released Security Bulletin MS02-025 to address this vulnerability and recommends that affected users apply the appropriate patch listed in the bulletin.

 

CREDIT
Discovered by Mr. Allendoerfer, Mr. Koenig, Mr. Kraemer, Mr. Schaal and Mr. Tacke of the Computing Center, Johannes Gutenberg University, Mainz, Germany.

TAGS: Security
Hide comments

Comments

  • Allowed HTML tags: <em> <strong> <blockquote> <br> <p>

Plain text

  • No HTML tags allowed.
  • Web page addresses and e-mail addresses turn into links automatically.
  • Lines and paragraphs break automatically.
Publish