This article was previously published under Q304063
This article has been archived. It is offered "as is" and will no longer be updated.
This article lists Microsoft Knowledge Base articles for Exchange 2000 Server remote procedure call (RPC) bugs that were fixed after Exchange 2000 Server was released. For additional information about how to obtain the fixes that are listed in this article, see the "More Information" section of this article, and then click the article number.
NOTE: Exchange 2000 Server fixes for a particular component are cumulative and contain all of the previous fixes for that component. Fixes with a particular version number contain all of the fixes that have an earlier version number.
These fixes are included in Exchange 2000 Server Service Pack 1 (SP1). For additional information about the latest service pack for Microsoft Exchange 2000 Server, click the article number below to view the article in the Microsoft Knowledge Base:
301378 XGEN: How to Obtain the Latest Exchange 2000 Server Service Pack
For your convenience, this individual fix is also available for download from the Microsoft Download Center:
For additional information about how to download Microsoft Support files, click the following article number to view the article in the Microsoft Knowledge Base:
119591 How to Obtain Microsoft Support Files from Online Services
Microsoft scanned this file for viruses. Microsoft used the most current virus-detection software that was available on the date that the file was posted. The file is stored on security-enhanced servers that help to prevent any unauthorized changes to the file.RPC fixes include the following files.
Fixes Released on July 26, 2001
The following files are modified:
Emsmta.exe incremented to version 6.6.4418.86
Srsmain.exe incremented to version 6.6.4419.06
The following fixes are included:
295435 XCON: Exchange 2000 MTA May Stop Unexpectedly Under RPC Denial of Service Attack
298611 XADM: SRS May Stop Responding Because of an RPC Denial of Service Attack
For additional information about an RPC vulnerability, see the following Microsoft Web site: