Seeing as he lives in Germany, he has the benefit of a few time zones..

------------------------------------------------------
Roger D. Seielstad - MCSE
Sr. Systems Administrator
Peregrine Systems
Atlanta, GA


> -----Original Message-----
> From: Orr, Dale [mailto:[EMAIL PROTECTED]] 
> Sent: Thursday, February 28, 2002 8:20 AM
> To: Exchange Discussions
> Subject: RE: Alert:Microsoft Security Bulletin - MS02-012
> 
> 
> <bowing to superior intellect> My gosh, Siefried! You must 
> be.... AWAKE ALREADY!!! </bowing and scraping>
> 
> -----Original Message-----
> From: Siegfried Weber [mailto:[EMAIL PROTECTED]]
> Sent: Thursday, February 28, 2002 8:14 AM
> To: Exchange Discussions
> Subject: RE: Alert:Microsoft Security Bulletin - MS02-012
> 
> 
> <quote>
> Does the vulnerability affect the SMTP service in Exchange Server 5.5?
> 
> No. Exchange 5.5, even if installed on Windows 2000, uses its 
> own SMTP service, which is not affected by the vulnerability </quote>
> 
> <Siegfried />
> 
> > -----Original Message-----
> > From: Orr, Dale [mailto:[EMAIL PROTECTED]]
> > Sent: Thursday, February 28, 2002 1:22 PM
> > To: Exchange Discussions
> > Subject: RE: Alert:Microsoft Security Bulletin - MS02-012
> > 
> > This one is giving me a headache -- I have Exch 5.5 running 
> on a Win2k 
> > server. I'm looking for the fine print that tells me which patch to
> apply
> > first, or at all, if any, or both. Your mileage may vary. Sigh.
> > 
> > -----Original Message-----
> > From: Martin Blackstone [mailto:[EMAIL PROTECTED]]
> > Sent: Wednesday, February 27, 2002 9:16 PM
> > To: Exchange Discussions
> > Subject: FW: Alert:Microsoft Security Bulletin - MS02-012
> > 
> > 
> > 
> > 
> > -----Original Message-----
> > From: Russ [mailto:[EMAIL PROTECTED]]
> > Sent: Wednesday, February 27, 2002 6:05 PM
> > To: [EMAIL PROTECTED]
> > Subject: Alert:Microsoft Security Bulletin - MS02-012
> > 
> > 
> > http://www.microsoft.com/technet/security/bulletin/MS02-012.asp
> > 
> > Malformed Data Transfer Request can Cause Windows SMTP 
> Service to Fail
> > 
> > Originally posted: February 27, 2002
> > 
> > Summary
> > 
> > Who should read this bulletin: Customers using Microsoft(r) 
> Windows(r) 
> > 2000 Server and Professional, Windows XP Professional and Exchange 
> > Server
> 2000
> > 
> > Impact of vulnerability:Denial of Service
> > 
> > Maximum Severity Rating:Low
> > 
> > Recommendation:Customers who need the Windows 2000 SMTP services
> should
> > apply the patch; all others should disable the SMTP service.
> > 
> > Affected Software:
> > - Microsoft Windows 2000
> > - Microsoft Windows XP Professional
> > - Microsoft Exchange 2000
> > 
> > Technical description:
> > 
> > An SMTP service installs by default as part of Windows 2000 server 
> > products. Exchange 2000, which can only be installed on 
> Windows 2000, 
> > uses the native
> > Windows 2000 SMTP service rather than providing its own.  
> In addition,
> > Windows 2000 and Windows XP workstation products provide an SMTP
> service
> > that is not installed by default.  All of these implementations
> contain a
> > flaw that could enable denial of service attacks to be 
> mounted against
> the
> > service.
> > 
> > The flaw involves how the service handles a particular type of SMTP 
> > command used to transfer the data that constitutes an 
> incoming mail.  
> > By
> sending a
> > malformed version of this command, an attacker could cause the SMTP 
> > service to fail. This would have the effect of disrupting mail 
> > services on the affected system, but would not cause the operating 
> > system itself to
> fail.
> > 
> > Mitigating factors:
> > - Windows XP Home Edition does not provide an SMTP service, 
> and is not 
> > affected by the vulnerability.
> > - Windows 2000 Professional and Windows XP Professional do 
> provide an
> SMTP
> > service, but it is not installed by default.
> > - Windows 2000 server products do install the SMTP service 
> by default. 
> > However, best practices recommend disabling any unneeded 
> services, and 
> > systems on which the SMTP service had been disabled would not be at
> risk.
> > - Exchange 5.5, even if installed on a Windows 2000 server, is not 
> > affected by the vulnerability.
> > - The result of an attack would be limited to disrupting the SMTP
> service
> > and, depending on the system configuration, potentially IIS 
> and other 
> > internet services as well.  However, it would not disrupt any other
> system
> > functions.
> > - The vulnerability would not enable an attacker to gain any
> privileges on
> > the affected system or to access users' email or data.
> > 
> > Vulnerability identifier: CAN-2002-0055
> > 
> > 
> > 
> > This email is sent to NTBugtraq automatically as a service to my 
> > subscribers. Since its programmatically created, and since 
> its been a
> long
> > time since anyone paid actual money for my programming 
> skills, it may
> or
> > may
> > not look that good...;-]
> > 
> > I can only hope that the information it does contain can be 
> read well 
> > enough to serve its purpose.
> > 
> > Cheers,
> > Russ - Surgeon General of TruSecure Corporation/NTBugtraq Editor
> > 
> >
> oooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooo
> oooooooooo
> oo
> > oo
> > Delivery co-sponsored by Qualys - Make Your Network Secure
> >
> oooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooo
> oooooooooo
> oo
> > oo
> > Go Beyond PARTIAL Security: FREE White Paper
> > 
> > Stop hassling with half-baked ENTERPRISE SECURITY.
> > FREE White Paper shows you how to ensure TOTAL security for your
> Internet
> > perimeter with the most current and most complete PROACTIVE
> Vulnerability
> > Assessment solution. Get your FREE White Paper now. Click here! 
> > https://www.qualys.com/forms/techwhite_86.html
> >
> oooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooo
> oooooooooo
> oo
> > oo
> > 
> > _________________________________________________________________
> > List posting FAQ:       http://www.swinc.com/resource/exch_faq.htm
> > Archives:               http://www.swynk.com/sitesearch/search.asp
> > To unsubscribe:         mailto:[EMAIL PROTECTED]
> > Exchange List admin:    [EMAIL PROTECTED]
> > 
> > _________________________________________________________________
> > List posting FAQ:       http://www.swinc.com/resource/exch_faq.htm
> > Archives:               http://www.swynk.com/sitesearch/search.asp
> > To unsubscribe:         mailto:[EMAIL PROTECTED]
> > Exchange List admin:    [EMAIL PROTECTED]
> 
> _________________________________________________________________
> List posting FAQ:       http://www.swinc.com/resource/exch_faq.htm
> Archives:               http://www.swynk.com/sitesearch/search.asp
> To unsubscribe:         mailto:[EMAIL PROTECTED]
> Exchange List admin:    [EMAIL PROTECTED]
> 
> _________________________________________________________________
> List posting FAQ:       http://www.swinc.com/resource/exch_faq.htm
> Archives:               http://www.swynk.com/sitesearch/search.asp
> To unsubscribe:         mailto:[EMAIL PROTECTED]
> Exchange List admin:    [EMAIL PROTECTED]
> 

_________________________________________________________________
List posting FAQ:       http://www.swinc.com/resource/exch_faq.htm
Archives:               http://www.swynk.com/sitesearch/search.asp
To unsubscribe:         mailto:[EMAIL PROTECTED]
Exchange List admin:    [EMAIL PROTECTED]

Reply via email to