Article ID: 258060 - View products that this article applies to.
This article was previously published under Q258060
This article has been archived. It is offered "as is" and will no longer be updated.
Microsoft has discovered a vulnerability that can be exploited when someone tries to connect to a Simple Messaging Application Programming Interface (SMAPI) port if, while the server is accepting the connection, that process is stopped. This action generates heap corruption that may cause the server to stop responding (hang).
This problem occurs because SmpHandleConnectionRequest frees ClientContext after a successful call to NtAcceptConnectPort. When Smss.exe receives an LPC_PORT_CLOSED message, an exception is generated because it attempts to close the client handle, but ClientContext has already been closed.
To resolve this problem, obtain the latest service pack for Windows 2000. For additional information, click the following article number to view the article in the Microsoft Knowledge Base:
(https://support.microsoft.com/kb/260910/EN-US/ )How to Obtain the Latest Windows 2000 Service Pack
Microsoft has confirmed that this is a problem in the Microsoft products that are listed at the beginning of this article. This problem was first corrected in Windows 2000 Service Pack 1.
For additional information about how to install Windows 2000 and Windows 2000 hotfixes at the same time, click the article number below to view the article in the Microsoft Knowledge Base:
(https://support.microsoft.com/kb/249149/EN-US/ )Installing Microsoft Windows 2000 and Windows 2000 Hotfixes
Article ID: 258060 - Last Review: October 20, 2013 - Revision: 3.3