SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (E-mail Server)  >   Microsoft Exchange Vendors:   Microsoft
Microsoft Exchange Server Buffer Overflow in Processing Extended Verb Requests May Let Remote Users Execute Arbitrary Code
SecurityTracker Alert ID:  1007937
SecurityTracker URL:  http://securitytracker.com/id/1007937
CVE Reference:   CVE-2003-0714   (Links to External Site)
Date:  Oct 15 2003
Impact:   Denial of service via network, Execution of arbitrary code via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): Microsoft Exchange Server 5.5 and Microsoft Exchange 2000 Server
Description:   A vulnerability was reported in Microsoft Exchange Server in the processing of SMTP messages. A remote user can send a specially crafted SMTP extended verb request to cause denial of service conditions or potentially execute arbitrary code.

It is reported that on Exchange Server 5.5, a remote user can connect to the SMTP port and send a specially crafted command to cause the target server to consume a large amount of memory. In some cases, the Internet Mail Service may shutdown or stop responding.

On Exchange 2000 Server, a remote user may be able to trigger a buffer overflow and execute arbitrary code in the security context of the SMTP service (e.g., Local System).

According to Microsoft, only Exchange 2000 Server contains a buffer overflow.

Microsoft has assigned a "Critical" severity level to Exchange 2000 Server and an "Important" severity level to Exchange Server 5.5.

Microsoft indicates that Microsoft Exchange Server 5.5 and Microsoft Exchange 2000 Server are affected but that Microsoft Exchange Server 2003 is not affected.

Microsoft credits Joao Gouveia with reporting this flaw.

Impact:   A remote user can cause the target service to consume available memory and crash or stop responding.

A remote user can execute arbitrary code with Local System privileges [Microsoft Exchange 2000 Server only].

Solution:   The following patches are available:

Microsoft Exchange Server 5.5, Service Pack 4

http://www.microsoft.com/downloads/details.aspx?FamilyId=A9E872EA-54B0-4179-8AE9-5648BFB46459&displaylang=en

Microsoft Exchange 2000 Server, Service Pack 3

http://www.microsoft.com/downloads/details.aspx?FamilyId=7BAF5394-1B4E-4937-A570-9F232AE49F01&displaylang=en

No reboot is required, however, certain services will be stopped and restarted. See the Vendor URL for full details.

Vendor URL:  www.microsoft.com/technet/security/bulletin/MS03-046.asp (Links to External Site)
Cause:   Boundary error, Resource error
Underlying OS:  Windows (NT), Windows (2000), Windows (2003), Windows (XP)

Message History:   None.


 Source Message Contents

Subject:  Microsoft Security Bulletin MS03-046


http://www.microsoft.com/technet/security/bulletin/MS03-046.asp

 > Vulnerability in Exchange Server Could Allow Arbitrary Code Execution (829436)

 > Impact of Vulnerability:  Remote Code Execution

 > Maximum Severity Rating:  Critical

CVE: CAN-2003-0714

Microsoft Exchange Server 5.5 and Microsoft Exchange 2000 Server are affected.  Microsoft 
Exchange Server 2003 is not affected.

A vulnerability was reported in Microsoft Exchange Server in the processing of SMTP 
messages.  A remote user can send a specially crafted SMTP extended verb request to cause 
denial of service conditions or potentially execute arbitrary code.

It is reported that on Exchange Server 5.5, a remote user can connect to the SMTP port and 
send specially crafted commands to cause the target server to consume a large amount of 
memory.  In some cases, the Internet Mail Service may shutdown or stop responding.

On Exchange 2000 Server, a remote user may be able to trigger a buffer overflow and 
execute arbitrary code in the security context of the SMTP service (e.g., Local System).

According to Microsoft, only Exchange 2000 Server contains a buffer overflow.

Microsoft has assigned a "Critical" severity level to Exchange 2000 Server and an 
"Important" severity level to Exchange Server 5.5.

Microsoft credits Joao Gouveia with reporting this flaw.

The following patches are available:

Microsoft Exchange Server 5.5, Service Pack 4

http://www.microsoft.com/downloads/details.aspx?FamilyId=A9E872EA-54B0-4179-8AE9-5648BFB46459&displaylang=en

Microsoft Exchange 2000 Server, Service Pack 3

http://www.microsoft.com/downloads/details.aspx?FamilyId=7BAF5394-1B4E-4937-A570-9F232AE49F01&displaylang=en

No reboot is required, however, certain services will be stopped and restarted.  See the 
Vendor URL for full details.



 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, SecurityGlobal.net LLC