This article has been archived. It is offered "as is" and will no longer be updated.
Microsoft has released an update rollup package for Microsoft Exchange Server 5.0 that includes the hotfixes and updates that are described in the following list. This small, comprehensive rollup of updates is an easy mechanism for managing the rollout of these fixes.
The following problems are resolved by this update:
A security vulnerability exists in the Internet Mail Connector that could allow an unauthenticated attacker to connect to the Simple Mail Transfer Protocol (SMTP) port on an Exchange 5.0 server and issue a specially crafted extended verb request that could allocate lots of memory. This could shut down the Internet Mail Connector or could cause the server to stop responding because of a low memory condition.
This issue is addressed in more detail in Microsoft Security Bulletin MS03-046.
Remote procedure call (RPC) requests that are sent to Microsoft Exchange services do not adequately validate inputs and in some cases will accept invalid inputs that prevent normal processing. The specific input values that are affected by this problem vary from RPC server to RPC server.
An attacker who sent such inputs to an affected RPC server could disrupt its service. The precise type of disruption would depend on the specific service, but could range in effect from minor (for example, the service temporarily stops responding or "hangs") to major (for example, the service fails in a way that would require the entire system to be restarted).
This issue is addressed in more detail in Microsoft Security Bulletin MS01-041.
Exchange 5.0 checks for invalid values in the MIME header fields as it processes incoming e-mail messages. However, if a particular type of invalid value is present in certain fields, the Exchange service will fail. You can restore ordinary operations by restarting the Exchange service and then deleting the offending e-mail message.
This vulnerability does not allow unauthorized users to add, delete or modify e-mail messages, nor can such users usurp administrative privileges on the server through this vulnerability.
This issue is addressed in more detail in Microsoft Security Bulletin MS00-082.
The update rollup package provides all the fixes that these three security bulletins provide. Therefore, if you install the update rollup package, all the problems that are described in these three security bulletins are corrected at the same time.
The English version of this update has the file attributes (or later) that are listed in the following table. The dates and times for these files are listed in coordinated universal time (UTC). When you view the file information, it is converted to local time. To find the difference between UTC and local time, use the Time Zone tab in the Date and Time tool in Control Panel.