Datamation Logo

‘Critical’ Exploit Detected in Exchange 2000

May 30, 2002
Datamation content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

A team of German researchers has found a flaw that could cause severe
overload on Microsoft Exchange 2000 e-mail servers and the software giant
Thursday issued a patch to plug the exploit.

In its latest security bulletin, Microsoft said researchers from the Johannes Gutenberg University in
Mainz, Germany detected a denial of service exploit with Exchange 2000 that
could cause an attacker to overload the CPU storage space on an e-mail
server.

Microsoft said the flaw was found in the way Exchange
2000 handled certain malformed RFC message attributes on received mail.
“Upon receiving a message containing such a malformation, the flaw causes
the Store service to consume 100% of the available CPU in processing the
message,” Microsoft explained.

It said the vulnerability results because it is possible for an attacker to
seek to exploit this flaw and mount a denial-of-service attack.

“An attacker could attempt to levy an attack by connecting directly to the
Exchange server and passing a raw, hand-crafted mail message with a
specially malformed attribute. When the message was received and processed
by the Store service, the CPU would spike to 100%. The effects of the attack
would last as long as it took for the Exchange Store service to process the
message. Neither restarting the service nor rebooting the server would
remedy the denial of service,” the company warned.

Even though Microsoft described the vulnerability as “critical,” it said the
effect of an attack would only be temporary. “Once the server completed
processing the message, normal operations would resume. However, it is not
possible to halt the processing of the message once begun, even with a
reboot,” the company said. The vulnerability would not compromise data on
the server or gain administrative control over it.

“Mounting a successful attack requires the ability to pass a hand-crafted
message to the target system, most likely through a simulated server-based
connection. It is not possible to craft a malformed message using an email
client such as Outlook or Outlook Express,” Microsoft added.

This article was first published on InternetNews, an internet.com site.

  SEE ALL
ARTICLES
 

Subscribe to Data Insider

Learn the latest news and best practices about data science, big data analytics, artificial intelligence, data security, and more.

Datamation Logo

Datamation is the leading industry resource for B2B data professionals and technology buyers. Datamation's focus is on providing insight into the latest trends and innovation in AI, data security, big data, and more, along with in-depth product recommendations and comparisons. More than 1.7M users gain insight and guidance from Datamation every year.

Advertisers

Advertise with TechnologyAdvice on Datamation and our other data and technology-focused platforms.

Advertise with Us

Our Brands


Privacy Policy Terms & Conditions About Contact Advertise California - Do Not Sell My Information

Property of TechnologyAdvice.
© 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.