Reported July 26, 2001, by Microsoft.

VERSIONS AFFECTED

  • Microsoft Exchange Server 5.5

  • Microsoft Exchange 2000

  • Microsoft SQL Server 7.0

  • Microsoft SQL Server 2000

  • Microsoft Windows NT 4.0 Workstation, NT 4.0 Server, and NT 4.0 Server, Enterprise Edition

  • Microsoft Windows NT 4.0, Terminal Server Edition

  • Microsoft Windows 2000 Datacenter Server

 

DESCRIPTION
Several of the remote procedure call (RPC) servers associated with the services of the Microsoft systems listed above might not validate input information properly. In some cases, these systems might accept invalid input information that can disrupt normal processing of legitimate requests. Specific values of invalid input vary among RPC servers. A malicious attacker can exploit this vulnerability by repeatedly sending these types of invalid RPC requests and cause a Denial of Service (DoS) attack.

 

VENDOR RESPONSE

The vendor, Microsoft, has released security bulletin MS01-041 to address this vulnerability and recommends that users apply any of the following patches that are relevant to their system:

 

Microsoft Exchange Server 5.5:
http://www.microsoft.com/Downloads/Release.asp?ReleaseID=31517

 

Microsoft Exchange Server 2000:
http://www.microsoft.com/Downloads/Release.asp?ReleaseID=31522
Exchange Server 2000 Service Pack 1 also contains this patch.

 

Microsoft SQL Server 7.0:
http://www.microsoft.com/Downloads/Release.asp?ReleaseID=31645
SQL Server 7.0 Service Pack 3 also contains this patch.

 

SQL Server 2000:
http://www.microsoft.com/Downloads/Release.asp?ReleaseID=31644
SQL Server 2000 Service Pack 1 also contains this patch.

 

Microsoft Windows NT 4.0 Workstation, Windows NT 4.0 Server, and Windows NT 4.0 Server, Enterprise Edition:
Windows NT 4.0 Security Roll-up contains this patch.

 

Microsoft Windows NT 4.0 Server, Terminal Server Edition:
Windows NT 4.0 Security Roll-up for Terminal Server will be included in the patch (to be released shortly).

 

Windows 2000 Datacenter Server patches are hardware specific and available only through the OEM.

 

CREDIT
Discovered by Bindview’s Razor Team.