{"vuid":"VU#874115","idnumber":"874115","name":"Microsoft Windows SMTP Service fails to properly handle responses from the NTLM authentication layer","keywords":["Microsoft Windows","SMTP Service","NTLM authentication layer","Internet Mail Connector","IMC","MS02-011"],"overview":"A flaw in the authentication code of the SMTP service provided with Windows 2000 server and Exchange 5.5 may allow a user access to the SMTP service. This acess could be used to relay mail in violation of the SMTP server's security policy, or consume CPU resources on the SMTP server.","clean_desc":"As of October 2003, The CERT/CC has begun seeing reports of exploitation. It is possible that an exploit for this vulnerability exists and is being used. Microsoft Released a patch for this issue in February 2002. It is recommended that USERS of Windows 2000 server and Exchange 5.5 apply the patch provided in MS02-011. In addition to exploiting this vulnerability to cause a denial of service, it is reported that the exploit attempts to guess passwords to common accounts on the system, such as administrator and IUSR_machinename. This highlights the importance of selecting strong passwords. For more information about selecting a strong password, we recommend that users review the following section of the Home Computer Security document: http://www.cert.org/homeusers/HomeComputerSecurity/#6 The vulnearbility is caused due to a problem in the checks performed after a valid NTLM authentication. A remote user that is able to successfully authneticate via NTLM may be able to utilize the SMTP server resources. The attacker would not gain administrative privileges, but could consume CPU resources, or relay mail in violation of the SMTP server's security policy. The vulnerability is present in SMTP servers shipped with Windows 2000 server, and Exchange 5.5 Internet Mail Connector. It is not present in the SMTP servers shipped with Windows NT 4.0 or Windows XP.","impact":"An attacker that is able to authenticate to the SMTP server may be able to relay mail in violation of the SMTP server's security policy, or consume CPU resources on the SMTP server.","resolution":"Apply a Patch Microsoft has published patches correcting this vulnerability. The patches are listed in their advisory at: http://www.microsoft.com/technet/security/bulletin/MS02-011.asp","workarounds":"","sysaffected":"","thanks":"Thanks to the BindView Razor team for discovering this vulnerability.","author":"This document was written by Cory F. Cohen.","public":["http://www.microsoft.com/technet/security/bulletin/ms02-011.asp","http://razor.bindview.com/publish/advisories/adv_iis_smtp_null_relay.html","http://online.securityfocus.com/bid/4205"],"cveids":["CVE-2002-0054"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2002-02-28T14:22:30Z","publicdate":"2002-02-27T00:00:00Z","datefirstpublished":"2002-09-27T17:50:35Z","dateupdated":"2003-10-09T21:21:02Z","revision":12,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"0","cam_population":"15","cam_impact":"5","cam_easeofexploitation":"15","cam_attackeraccessrequired":"4","cam_scorecurrent":"1.265625","cam_scorecurrentwidelyknown":"1.6875","cam_scorecurrentwidelyknownexploited":"3.375","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":1.265625,"vulnote":null}