MS Security Bulletin MS02-012

Discussion in 'other security issues & news' started by Zhen-Xjell, Feb 28, 2002.

Thread Status:
Not open for further replies.
  1. Zhen-Xjell

    Zhen-Xjell Security Expert

    Joined:
    Feb 8, 2002
    Posts:
    1,397
    Location:
    Ohio
    -----BEGIN PGP SIGNED MESSAGE-----

    - ----------------------------------------------------------------------
    Title:      Malformed Data Transfer Request can Cause Windows SMTP
               Service to Fail
    Date:       27 February 2002
    Software:   Microsoft Windows 2000; Microsoft Windows XP Professional
               Microsoft Exchange 2000
    Impact:     Denial of Service
    Max Risk:   Low
    Bulletin:   MS02-012

    Microsoft encourages customers to review the Security Bulletin at:
    http://www.microsoft.com/technet/security/bulletin/MS02-012.asp.
    - ----------------------------------------------------------------------

    Issue:
    ======
    An SMTP service installs by default as part of Windows 2000 server
    products. Exchange 2000, which can only be installed on Windows 2000,
    uses the native Windows 2000 SMTP service rather than providing its
    own. In addition, Windows 2000 and Windows XP workstation products
    provide an SMTP service that is not installed by default. All of
    these implementations contain a flaw that could enable denial of
    service attacks to be mounted against the service.

    The flaw involves how the service handles a particular type of SMTP
    command used to transfer the data that constitutes an incoming
    mail. By sending a malformed version of this command, an attacker
    could cause the SMTP service to fail. This would have the effect
    of disrupting mail services on the affected system, but would not
    cause the operating system itself to fail.

    Mitigating Factors:
    ====================
    - Windows XP Home Edition does not provide an SMTP service, and
      is not affected by the vulnerability.

    - Windows 2000 Professional and Windows XP Professional do provide
      an SMTP service, but it is not installed by default.

    - Windows 2000 server products do install the SMTP service by
      default. However, best practices recommend disabling any
      unneeded services, and systems on which the SMTP service had been
      disabled would not be at risk.

    - Exchange 5.5, even if installed on a Windows 2000 server, is not
      affected by the vulnerability.

    - The result of an attack would be limited to disrupting the SMTP
      service and, depending on the system configuration, potentially
      IIS and other internet services as well. However, it would not
      disrupt any other system functions.

    - The vulnerability would not enable an attacker to gain any
      privileges on the affected system or to access users' email or
      data.

    Risk Rating:
    ============
    - Internet systems: Low
    - Intranet systems: Low
    - Client systems: Low

    Patch Availability:
    ===================
    - A patch is available to fix this vulnerability. Please read the
      Security Bulletin at
      http://www.microsoft.com/technet/security/bulletin/ms02-012.asp
      for information on obtaining this patch.

    Acknowledgment:
    ===============
    -  H D Moore (hdm@secureaustin.com)

    - ---------------------------------------------------------------------

    THE INFORMATION PROVIDED IN THE MICROSOFT KNOWLEDGE BASE IS
    PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND. MICROSOFT DISCLAIMS
    ALL
    WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING THE
    WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.
    IN NO EVENT
    SHALL MICROSOFT CORPORATION OR ITS SUPPLIERS BE LIABLE FOR ANY
    DAMAGES
    WHATSOEVER INCLUDING DIRECT, INDIRECT, INCIDENTAL, CONSEQUENTIAL,
    LOSS OF
    BUSINESS PROFITS OR SPECIAL DAMAGES, EVEN IF MICROSOFT CORPORATION OR
    ITS
    SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. SOME
    STATES DO
    NOT ALLOW THE EXCLUSION OR LIMITATION OF LIABILITY FOR CONSEQUENTIAL
    OR
    INCIDENTAL DAMAGES SO THE FOREGOING LIMITATION MAY NOT APPLY.

    -----BEGIN PGP SIGNATURE-----
    Version: PGP 7.1

    iQEVAwUBPH2VtY0ZSRQxA/UrAQFqjAgAhoe9Ryd4VWtJ/AvFSct50vx42qKE1vUW
    ai/uDPZpV2m5BiA0wDWgeNVkwqdYeOpuw5XW5usl53YkgE45AY943dBViSlUOzgj
    3P1nChUPgrvtAaMvZYJLtm0iQWK0oz2Qq/zAtHVDr339KAYmOi1PBC/cdx6+ZBmj
    cHYYLwbFQMtLc2ezB7SE9u+ky3VtptSHfGUvA1Nq5GwmnMPHmw4+pCYyhgAkJD+R
    IfMMovinlh4zB2ewGzZ5M77ffrHhZDHhn5TyEnxPx7RXzsR7NqThEoanCc4Nbzw1
    5f51sRwy1iayafAIFLpqw+iODXa9pfjbzVrxAQcleIEar9z+JM65zQ==
    =kDRR
    -----END PGP SIGNATURE-----


    *******************************************************************

    You have received this e-mail bulletin as a result of your subscription to the Microsoft Product Security Notification   Service.  For more information on this service, please visit http://www.microsoft.com/technet/security/notify.asp.

    To verify the digital signature on this bulletin, please download our PGP key at http://www.microsoft.com/technet/security/notify.asp.

    To cancel your subscription, click on the following link mailto:1_26427_1E81A08D-A2CD-4E10-8D7F-16D1039270F8_US@Newsletters.Microsoft.com?subject=UNSUBSCRIBE to create an unsubscribe e-mail.

    To stop all e-mail newsletters from microsoft.com, click on the following link mailto:2_26427_1E81A08D-A2CD-4E10-8D7F-16D1039270F8_US@Newsletters.Microsoft.com?subject=STOPMAIL to create an unsubscribe e-mail.  You can manage all your Microsoft.com communication preferences from http://www.microsoft.com/misc/unsubscribe.htm

    For security-related information about Microsoft products, please  visit the Microsoft Security Advisor web site at http://www.microsoft.com/security.
     
Thread Status:
Not open for further replies.
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.