XADM: The Exchange 2000 System Attendant Incorrectly Sets Remote Registry Permissions

Article translations Article translations
Article ID: 315085 - View products that this article applies to.
This article was previously published under Q315085
This article has been archived. It is offered "as is" and will no longer be updated.
Expand all | Collapse all

SYMPTOMS

A vulnerability exists in Microsoft Exchange 2000 Server that may allow unprivileged users to remotely access configuration information on an Exchange 2000 server. In the worst case, an attacker might use this vulnerability to change configuration settings on the server. This vulnerability is subject to several mitigating factors:
  • The vulnerability only provides an attacker with the ability to access the configuration. The permissions on the specific configuration values determine whether or not the attacker can take any action on them.
  • If you follow typical firewalling practices, attackers on the Internet are prevented from exploiting this vulnerability.

CAUSE

This vulnerability exists because the Exchange 2000 system attendant incorrectly adds the Everyone group to the security permissions of the following key in the registry:
HKEY_LOCAL_MACHINE \SYSTEM\CurrentControlSet\Control\SecurePipeServers\winreg

RESOLUTION

To resolve this problem, obtain the latest service pack for Microsoft Exchange 2000 Server. For additional information, click the following article number to view the article in the Microsoft Knowledge Base:
301378 XGEN: How to Obtain the Latest Exchange 2000 Server Service Pack
For additional information about the problems that this patch fixes, click the article number below to view the article in the Microsoft Knowledge Base:
316056 XGEN: Exchange 2000 Server Post-Service Pack 2 Admin Fixes Available
The following files are available for download from the Microsoft Download Center:
English (US):
Collapse this imageExpand this image
Download
Download Q316056engi386.exe now

French:
Collapse this imageExpand this image
Download
Download Q316056frni386.exe now

German:
Collapse this imageExpand this image
Download
Download Q316056geri386.exe now

Italian:
Collapse this imageExpand this image
Download
Download Q316056itai386.exe now

Japanese:
Collapse this imageExpand this image
Download
Download Q316056jpni386.exe now

Spanish:
Collapse this imageExpand this image
Download
Download Q316056spai386.exe now
Release Date: February 1, 2002

For additional information about how to download Microsoft Support files, click the following article number to view the article in the Microsoft Knowledge Base:
119591 How to Obtain Microsoft Support Files from Online Services
Microsoft scanned this file for viruses. Microsoft used the most current virus-detection software that was available on the date that the file was posted. The file is stored on security-enhanced servers that help to prevent any unauthorized changes to the file. The English version of this fix should have the following file attributes or later:

Component: Admin

Collapse this tableExpand this table
File nameVersion
Mad.exe6.0.5770.21

NOTE: Because of file dependencies, this update requires Microsoft Exchange 2000 Server Service Pack 2.

STATUS

Microsoft has confirmed that this problem may cause a degree of security vulnerability in Microsoft Exchange 2000 Server. This problem was first corrected in Microsoft Exchange 2000 Server Service Pack 3.

MORE INFORMATION

For additional information about this vulnerability, see the following Microsoft Web site:
http://www.microsoft.com/technet/security/bulletin/MS02-003.mspx

Properties

Article ID: 315085 - Last Review: October 24, 2013 - Revision: 3.3
APPLIES TO
  • Microsoft Exchange 2000 Server Standard Edition
Keywords: 
kbnosurvey kbarchive kbbug kbexchange2000presp3fix kbexchange2000sp3fix kbfix kbsecbulletin kbsechack kbsecurity kbsecvulnerability KB315085

Contact us for more help

Contact us for more help
Connect with Answer Desk for expert help.
Get more support from smallbusiness.support.microsoft.com