{"vuid":"VU#155252","idnumber":"155252","name":"Microsoft Windows 2000 SMTP service vulnerable to DoS when processing message with corrupted time stamp","keywords":["Microsoft","Windows 2000","SMTP service","DoS","denial of service","corrupted time stamp","FILETIME attribute","Q3307164"],"overview":"Some versions of Microsoft Windows 2000 feature an SMTP service for handling Internet email. A flaw in this SMTP service may result in a denial-of-service vulnerability.","clean_desc":"When a message with a corrupted time stamp is received by a vulnerable system, the SMTP service may stop responding or shut down unexpectedly. This issue may occur when the FILETIME attribute of the message is not valid. According to Microsoft, this issue affects systems running Microsoft Windows 2000 Server with Service Pack 2 or Service Pack 3 installed and systems running Microsoft Exchange 2000 Server.","impact":"The SMTP service may stop responding or shut down unexpectedly, resulting in a denial of service.","resolution":"Microsoft has included a patch for this issue in Windows 2000 Service Pack 4. For additional information, users are encouraged to review the following Microsoft Knowledge Base Articles: 330716 - Corrupted Inbound Message Causes the SMTP Service to Stop or to Shut Down Unexpectedly\n260910 - How to Obtain the Latest Windows 2000 Service Pack","workarounds":"","sysaffected":"","thanks":"Thanks to Microsoft for reporting this vulnerability.","author":"This document was written by Chad R Dougherty.","public":["http://support.microsoft.com/?kbid=327194","http://support.microsoft.com/default.aspx?kbid=330716"],"cveids":[""],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2003-07-08T15:23:25Z","publicdate":"2003-07-02T00:00:00Z","datefirstpublished":"2003-07-15T17:09:01Z","dateupdated":"2003-07-15T17:09:05Z","revision":10,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"11","cam_population":"15","cam_impact":"8","cam_easeofexploitation":"8","cam_attackeraccessrequired":"20","cam_scorecurrent":"9.36","cam_scorecurrentwidelyknown":"11.16","cam_scorecurrentwidelyknownexploited":"18.36","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":9.36,"vulnote":null}