This article was previously published under Q320436
This article has been archived. It is offered "as is" and will no longer be updated.
A denial of service vulnerability exists in Microsoft Exchange 2000 Server. An attacker who can successfully make a direct connection to an Exchange 2000 Server and pass raw, hand-crafted mail messages directly to it can seek to exploit this vulnerability and cause the system to become unresponsive.
This vulnerability does not enable the attacker to gain any privileges on the system, nor to read, send, or delete any user's mail on the system. After the message had been processed, the system returns to normal.
This vulnerability results from a flaw in how Exchange 2000 Server handles mail messages with certain malformed message attributes. Instead of rejecting the malformed messages immediately, the Exchange 2000 Information Store service tries to process the message. In doing so, the Exchange 2000 Information Store service uses all available CPU and prevents any other services on the server from functioning during this period.
To resolve this problem, obtain the latest service pack for Microsoft Exchange 2000 Server. For additional information, click the following article number to view the article in theMicrosoft Knowledge Base:
301378 XGEN: How to Obtain the Latest Exchange 2000 Server Service Pack
For additional information about how to download Microsoft Support files, click the following article number to view the article in the Microsoft Knowledge Base:
119591 How to Obtain Microsoft Support Files from Online Services
Microsoft scanned this file for viruses. Microsoft used the most current virus-detection software that was available on the date that the file was posted. The file is stored on security-enhanced servers that help to prevent any unauthorized changes to the file.
You do not have to restart your computer after you apply this update. However, you must use the /s option to install this hotfix. For additional information about the command options that you can use to apply this update, click the article number below to view the article in the Microsoft Knowledge Base:
For example, the following command line installs the update without any user intervention, and does not force the computer to restart:
The English version of this fix has the file attributes (or later) that are listed in the following table. The dates and times for these files are listed in coordinated universal time (UTC). When you view the file information, it is converted to local time. To find the difference between UTC and local time, use the Time Zone tab in the Date and Time tool in Control Panel.
NOTE: If the cluster service is not detected during setup, the Exres.dll file is copied to the %EXSRVROOT%\Bin folder.
Microsoft has confirmed that this problem may cause a degree of security vulnerability in Microsoft Exchange 2000 Server. This problem was first corrected in Microsoft Exchange 2000 Server Service Pack 3.
For more information about this vulnerability, visit the following Microsoft Web site: