{"vuid":"VU#422156","idnumber":"422156","name":"Microsoft Exchange Server fails to properly handle specially crafted SMTP extended verb requests","keywords":["Microsoft","Exchange Server","DoS","denial of service","consume all resources","buffer overflow","crafted SMTP extended verb request","Q829436","MS03-046"],"overview":"Microsoft Exchange fails to handle certain SMTP extended verbs correctly. In Exchange 5.5, this can lead to a denial-of-service condition. In Exchange 2000, this could permit an attacker to run arbitrary code.","clean_desc":"Microsoft Exchange is a popular collaboration product which includes extensive support for electronic mail, including support for SMTP. SMTP is a standard protocol for exchanging electronic mail over the internet. Exchange uses SMTP to communicate special handling instructions from one Exchange server to another through the use of SMTP extended verbs. Exchange fails to process some of these commands correctly. On Exchange 5.5, the failure can result in a denial of service condition, and on Exchange 2000, it could result in an attacker running arbitrary code. For more information, see Microsoft Security Bulletin MS03-046.","impact":"An attacked could cause a denial of service condition against Exchange 5.5 or execute arbitrary code against Exchange 2000.","resolution":"Apply a patch as described in Microsoft Security Bulletin MS03-046.","workarounds":"","sysaffected":"","thanks":"Thanks to Microsoft  for reporting this vulnerability. Microsoft has credited \nJoão Gouveia for reporting this vulnerability.","author":"This document was written by Shawn Hernan based on information contained in Microsoft Security Bulletin MS03-046.","public":["http://www.securityfocus.com/archive/1/341978","http://www.microsoft.com/technet/security/bulletin/MS03-046.asp","http://support.microsoft.com/default.aspx?scid=kb;en-us;829436"],"cveids":["CVE-2003-0714"],"certadvisory":"CA-2003-27","uscerttechnicalalert":null,"datecreated":"2003-10-15T19:55:42Z","publicdate":"2003-10-15T00:00:00Z","datefirstpublished":"2003-10-16T03:12:21Z","dateupdated":"2003-10-22T15:34:38Z","revision":5,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"10","cam_population":"15","cam_impact":"19","cam_easeofexploitation":"15","cam_attackeraccessrequired":"20","cam_scorecurrent":"40.078125","cam_scorecurrentwidelyknown":"48.09375","cam_scorecurrentwidelyknownexploited":"80.15625","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":40.078125,"vulnote":null}