Eeek, wasn't that the buggy one? ;-) Phil
--------------------------------------------- Phil Randal Network Engineer Herefordshire Council Hereford, UK > -----Original Message----- > From: Andy David [mailto:[EMAIL PROTECTED]] > Sent: 28 February 2002 12:42 > To: Exchange Discussions > Subject: RE: Alert:Microsoft Security Bulletin - MS02-012 > > > Its a good thing I'm still on DOS 4.0 > > > > -----Original Message----- > From: Martin Blackstone [mailto:[EMAIL PROTECTED]] > Sent: Wednesday, February 27, 2002 9:16 PM > To: Exchange Discussions > Subject: FW: Alert:Microsoft Security Bulletin - MS02-012 > > > > > -----Original Message----- > From: Russ [mailto:[EMAIL PROTECTED]] > Sent: Wednesday, February 27, 2002 6:05 PM > To: [EMAIL PROTECTED] > Subject: Alert:Microsoft Security Bulletin - MS02-012 > > > http://www.microsoft.com/technet/security/bulletin/MS02-012.asp > > Malformed Data Transfer Request can Cause Windows SMTP Service to Fail > > Originally posted: February 27, 2002 > > Summary > > Who should read this bulletin: Customers using Microsoft(r) > Windows(r) 2000 > Server and Professional, Windows XP Professional and Exchange > Server 2000 > > Impact of vulnerability:Denial of Service > > Maximum Severity Rating:Low > > Recommendation:Customers who need the Windows 2000 SMTP > services should > apply the patch; all others should disable the SMTP service. > > Affected Software: > - Microsoft Windows 2000 > - Microsoft Windows XP Professional > - Microsoft Exchange 2000 > > Technical description: > > An SMTP service installs by default as part of Windows 2000 > server products. > Exchange 2000, which can only be installed on Windows 2000, > uses the native > Windows 2000 SMTP service rather than providing its own. In addition, > Windows 2000 and Windows XP workstation products provide an > SMTP service > that is not installed by default. All of these > implementations contain a > flaw that could enable denial of service attacks to be > mounted against the > service. > > The flaw involves how the service handles a particular type > of SMTP command > used to transfer the data that constitutes an incoming mail. > By sending a > malformed version of this command, an attacker could cause > the SMTP service > to fail. This would have the effect of disrupting mail services on the > affected system, but would not cause the operating system > itself to fail. > > Mitigating factors: > - Windows XP Home Edition does not provide an SMTP service, and is not > affected by the vulnerability. > - Windows 2000 Professional and Windows XP Professional do > provide an SMTP > service, but it is not installed by default. > - Windows 2000 server products do install the SMTP service by default. > However, best practices recommend disabling any unneeded services, and > systems on which the SMTP service had been disabled would not > be at risk. > - Exchange 5.5, even if installed on a Windows 2000 server, > is not affected > by the vulnerability. > - The result of an attack would be limited to disrupting the > SMTP service > and, depending on the system configuration, potentially IIS and other > internet services as well. However, it would not disrupt any > other system > functions. > - The vulnerability would not enable an attacker to gain any > privileges on > the affected system or to access users' email or data. > > Vulnerability identifier: CAN-2002-0055 > > > > This email is sent to NTBugtraq automatically as a service to my > subscribers. Since its programmatically created, and since > its been a long > time since anyone paid actual money for my programming > skills, it may or may > not look that good...;-] > > I can only hope that the information it does contain can be > read well enough > to serve its purpose. > > Cheers, > Russ - Surgeon General of TruSecure Corporation/NTBugtraq Editor > > oooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooo > oooooooooooooo > Delivery co-sponsored by Qualys - Make Your Network Secure > oooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooo > oooooooooooooo > Go Beyond PARTIAL Security: FREE White Paper > > Stop hassling with half-baked ENTERPRISE SECURITY. > FREE White Paper shows you how to ensure TOTAL security for > your Internet > perimeter with the most current and most complete PROACTIVE > Vulnerability > Assessment solution. Get your FREE White Paper now. Click here! > https://www.qualys.com/forms/techwhite_86.html > oooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooo > oooooooooooooo > > _________________________________________________________________ > List posting FAQ: http://www.swinc.com/resource/exch_faq.htm > Archives: http://www.swynk.com/sitesearch/search.asp > To unsubscribe: mailto:[EMAIL PROTECTED] > Exchange List admin: [EMAIL PROTECTED] > > -------------------------------------------------------------- > ---------------- > The information contained in this email message is privileged > and confidential information intended only for the use of the > individual or entity to whom it is addressed. If the reader > of this message is not the intended recipient, you are hereby > notified that any dissemination, distribution or copy of this > message is strictly prohibited. If you have received this > email in error, please immediately notify Veronis Suhler > Stevenson by telephone (212)935-4990, fax (212)381-8168, or > email ([EMAIL PROTECTED]) and delete the message. Thank you. > > ============================================================== > ================ > > > _________________________________________________________________ > List posting FAQ: http://www.swinc.com/resource/exch_faq.htm > Archives: http://www.swynk.com/sitesearch/search.asp > To unsubscribe: mailto:[EMAIL PROTECTED] > Exchange List admin: [EMAIL PROTECTED] > _________________________________________________________________ List posting FAQ: http://www.swinc.com/resource/exch_faq.htm Archives: http://www.swynk.com/sitesearch/search.asp To unsubscribe: mailto:[EMAIL PROTECTED] Exchange List admin: [EMAIL PROTECTED]