MS02-025: Malformed Mail Attribute Can Cause Exchange 2000 to Use Up CPU Resources

Article translations Article translations
Article ID: 320436 - View products that this article applies to.
This article was previously published under Q320436
This article has been archived. It is offered "as is" and will no longer be updated.
Expand all | Collapse all

SYMPTOMS

A denial of service vulnerability exists in Microsoft Exchange 2000 Server. An attacker who can successfully make a direct connection to an Exchange 2000 Server and pass raw, hand-crafted mail messages directly to it can seek to exploit this vulnerability and cause the system to become unresponsive.

This vulnerability does not enable the attacker to gain any privileges on the system, nor to read, send, or delete any user's mail on the system. After the message had been processed, the system returns to normal.

CAUSE

This vulnerability results from a flaw in how Exchange 2000 Server handles mail messages with certain malformed message attributes. Instead of rejecting the malformed messages immediately, the Exchange 2000 Information Store service tries to process the message. In doing so, the Exchange 2000 Information Store service uses all available CPU and prevents any other services on the server from functioning during this period.

RESOLUTION

To resolve this problem, obtain the latest service pack for Microsoft Exchange 2000 Server. For additional information, click the following article number to view the article in the Microsoft Knowledge Base:
301378 XGEN: How to Obtain the Latest Exchange 2000 Server Service Pack

Download Information

The following files are available for download from the Microsoft Download Center:
English:
Collapse this imageExpand this image
Download
Download the Q320436 package now

French:
Collapse this imageExpand this image
Download
Download the Q320436 package now

German:
Collapse this imageExpand this image
Download
Download the Q320436 package now

Italian:
Collapse this imageExpand this image
Download
Download the Q320436 package now

Japanese:
Collapse this imageExpand this image
Download
Download the Q320436 package now

Spanish:
Collapse this imageExpand this image
Download
Download the Q320436 package now
Release Date: May 29, 2002

For additional information about how to download Microsoft Support files, click the following article number to view the article in the Microsoft Knowledge Base:
119591 How to Obtain Microsoft Support Files from Online Services
Microsoft scanned this file for viruses. Microsoft used the most current virus-detection software that was available on the date that the file was posted. The file is stored on security-enhanced servers that help to prevent any unauthorized changes to the file.

Installation Options

You do not have to restart your computer after you apply this update. However, you must use the /s option to install this hotfix. For additional information about the command options that you can use to apply this update, click the article number below to view the article in the Microsoft Knowledge Base:
257946 XGEN: GUI Hotfix Utility Switches /x /m /s /z
For example, the following command line installs the update without any user intervention, and does not force the computer to restart:
q320436enui386 /s

File Information

The English version of this fix has the file attributes (or later) that are listed in the following table. The dates and times for these files are listed in coordinated universal time (UTC). When you view the file information, it is converted to local time. To find the difference between UTC and local time, use the Time Zone tab in the Date and Time tool in Control Panel.

Component: Information Store
   Date         Time   Version      Size       File name and Path
   ------------------------------------------------------------------------
   29-Apr-2002  15:04  6.0.5770.91    676,352  %EXSRVROOT%\Bin\Davex.dll
   29-Apr-2002  15:01  6.0.5770.91    578,116  %EXSRVROOT%\Bin\Dsaccess.dll
   29-Apr-2002  13:52  6.0.5770.91    180,736  %EXSRVROOT%\Bin\Dscmsg.dll
   29-Apr-2002  15:13  6.0.5770.91  3,518,976  %EXSRVROOT%\Bin\Excdo.dll
   29-Apr-2002  14:11  6.0.5770.91  1,860,096  %EXSRVROOT%\Bin\Exmgmt.exe
   29-Apr-2002  15:04  6.0.5770.91  1,683,968  %EXSRVROOT%\Bin\Exoledb.dll
   29-Apr-2002  15:04  6.0.5770.91    209,408  %EXSRVROOT%\Bin\Exprox.dll
   29-Apr-2002  13:41  6.0.5770.91    135,680  %CLUSTERDIR%\Exres.dll
   29-Apr-2002  13:51  6.0.5770.91    717,312  %EXSRVROOT%\Bin\Exsp.dll
   29-Apr-2002  14:11  6.0.5770.91  1,339,904  %EXSRVROOT%\Bin\Exwmi.dll
   29-Apr-2002  15:02  6.0.5770.91     41,532  %EXSRVROOT%\Bin\Jcb.dll
   29-Apr-2002  14:11  6.0.5770.91  2,949,632  %EXSRVROOT%\Bin\Mad.exe
   29-Apr-2002  14:10  6.0.5770.91  2,249,216  %EXSRVROOT%\RES\Mdbmsg.dll
   29-Apr-2002  14:17  6.0.5770.91    897,536  %EXSRVROOT%\Bin\Mdbsz.dll
   29-Apr-2002  14:59  6.0.5770.91    377,412  %EXSRVROOT%\Bin\Phatcat.dll
   29-Apr-2002  15:01  6.0.5770.91  4,547,136  %EXSRVROOT%\Bin\Store.exe
NOTE: If the cluster service is not detected during setup, the Exres.dll file is copied to the %EXSRVROOT%\Bin folder.

STATUS

Microsoft has confirmed that this problem may cause a degree of security vulnerability in Microsoft Exchange 2000 Server. This problem was first corrected in Microsoft Exchange 2000 Server Service Pack 3.

MORE INFORMATION

For more information about this vulnerability, visit the following Microsoft Web site:
http://www.microsoft.com/technet/security/bulletin/MS02-025.mspx

Properties

Article ID: 320436 - Last Review: October 24, 2013 - Revision: 3.4
APPLIES TO
  • Microsoft Exchange 2000 Server Standard Edition
Keywords: 
kbnosurvey kbarchive kbbug kbexchange2000presp3fix kbexchange2000sp3fix kbfix kbsechack kbsecurity kbsecvulnerability KB320436

Give Feedback

 

Contact us for more help

Contact us for more help
Connect with Answer Desk for expert help.
Get more support from smallbusiness.support.microsoft.com