MS02-012: A Malformed Data Transfer Request May Cause the Windows SMTP Service to Stop Working

Support for Windows XP has ended

Microsoft ended support for Windows XP on April 8, 2014. This change has affected your software updates and security options. Learn what this means for you and how to stay protected.

This article was previously published under Q313450
This article has been archived. It is offered "as is" and will no longer be updated.
Symptoms
A Simple Mail Transport Protocol (SMTP) service is installed by default in the Windows 2000 Server family of products. Exchange 2000, which you can install only on Windows 2000, uses the included Windows 2000 SMTP service instead of providing its own service. Windows 2000 Professional and Windows XP Professional include an SMTP service that is not installed by default. All of these implementations contain a flaw that could allow denial-of-service attacks to be mounted against the service.

The flaw involves the manner in which the service handles a particular type of SMTP command that is used to transfer the data that constitutes an incoming e-mail message. By sending a malformed version of this command, an attacker could stop the SMTP service or severely affect the performance of the SMTP service. This could disrupt mail services on the affected computer, but would not cause the operating system itself to stop working.

Mitigating Factors

  • Microsoft Windows XP Home Edition does not include an SMTP service, and is not affected by the vulnerability.
  • Windows 2000 Professional and Windows XP Professional do provide an SMTP service, but it is not installed by default.
  • The Windows 2000 Server family of products install the SMTP service by default. However, best practices recommend that you disable any unnecessary services. Computers on which you have disabled the SMTP service are not at risk.
  • Microsoft Exchange 5.5 is not affected by the vulnerability, even if it is installed on a Windows 2000-based server.
  • The result of an attack would be limited to disrupting the SMTP service and, depending on the server's configuration, also possibly disrupting Microsoft Internet Information Services (IIS) and other Internet services. However, it would not disrupt any other server functions.
  • The vulnerability would not enable an attacker to gain any privileges on the affected server, or to access users' e-mail or data.
Resolution

 
Windows XP Professional

To resolve this problem, obtain the latest service pack for Windows XP. For additional information, click the following article number to view the article in theMicrosoft Knowledge Base:
322389 How to Obtain the Latest Windows XP Service Pack
The following file is available for download from the Microsoft Download Center:
Release Date: February 27, 2002

For additional information about how to download Microsoft Support files, click the following article number to view the article in the Microsoft Knowledge Base:
119591 How to Obtain Microsoft Support Files from Online Services
Microsoft scanned this file for viruses. Microsoft used the most current virus-detection software that was available on the date that the file was posted. The file is stored on security-enhanced servers that help to prevent any unauthorized changes to the file.The English version of this fix should have the following file attributes or later:
   Date         Time   Version      Size     File name   -----------------------------------------------------   06-Feb-2002  17:57  6.0.2600.28  431,104  Smtpsvc.dll				

Status

Windows XP Professional

Microsoft has confirmed that this problem may cause a degree of security vulnerability in Microsoft Windows XP Professional. This problem was first corrected in Windows XP Service Pack 1.
More information
For more information about this vulnerability, visit the following Microsoft Web site:
kbSecurity kbAppCompat kbMgmtAdmin security_patch
Properties

Article ID: 313450 - Last Review: 02/27/2014 21:10:57 - Revision: 4.0

  • Microsoft Windows XP Professional
  • kbnosurvey kbarchive kbappcompatibility kbbug kbfix kbsecbulletin kbsechack kbsecurity kbsecvulnerability kbsysadmin kbwin2000presp3fix kbWin2000sp3fix kbWinXPsp1fix KB313450
Feedback