Microsoft Exchange 2000 Malformed Mail Attribute can Cause Exchange 2000 to Exhaust CPU Resources for Windows Free Download in Security Software Tag

Educational & Science Software  Video Software  Graphic Design Software  CAD Software  Privacy Software & Access control  Networking Software  Games  Developer Tools  Internet Software  Security Software  Wireless Networking Software  Database Software  Disk & File Software  System Utilities  Video Players  Digital Photo Software  Audio Software  Communication Software  3D Modeling Software  Database Management Software  Business & Office Software 
Search by Category
Audio Software
Business & Office Software
CD & DVD Software
Communication Software
Desktop Enhancements
Developer Tools
Digital Photo Software
Disk & File Software
Educational & Science Software
Entertainment & Hobby Software
Graphic Design Software
Home & Family Software
Internet Software
iTunes & iPod Software
Networking Software
Productivity Software
Security Software
Antivirus Software
Corporate Security Software
Encryption & Decryption Software
Firewall Software
Internet Security Software Suites
Password Managers
Privacy Software & Access control
Security Monitoring Software
System Utilities
Travel & Navigation Software
Video Software
Web Development Software

Microsoft Exchange 2000 Malformed Mail Attribute can Cause Exchange 2000 to Exhaust CPU Resources

Microsoft Exchange 2000 Malformed Mail Attribute can Cause Exchange 2000 to Exhaust CPU Resources
Version: Q320436
Platforms: Windows

Categories: Security Software
Upload Date: 2 Nov 15
Developer: Microsoft
Distribution Type: Freeware
Downloads: 1
File Size: 15578 Kb
Free Download Microsoft Exchange 2000 Malformed Mail Attribute can Cause Exchange 2000 to Exhaust CPU Resources 

Rating: 1.0/5 (Total votes: 1)

To support the exchange of mail with heterogeneous systems, Exchange messages use the attributes of SMTP mail messages that are specified by RFC's 821 and 822. There is a flaw in the way Exchange 2000 handles certain malformed RFC message attributes on received mail. Upon receiving a message containing such a malformation, the flaw causes the Store service to consume 100% of the available CPU in processing the message.

A security vulnerability results because it is possible for an attacker to seek to exploit this flaw and mount a denial of service attack. An attacker could attempt to levy an attack by connecting directly to the Exchange server and passing a raw, hand-crafted mail message with a specially malformed attribute. When the message was received and processed by the Store service, the CPU would spike to 100%. The effects of the attack would last as long as it took for the Exchange Store service to process the message. Neither restarting the service nor rebooting the server would remedy the denial of service.


  • Microsoft Exchange 2000 SP2

    Like it? Share with your friends!   

    Other Windows Software of Developer «Microsoft»:

    Service Pack 2 for Business Contact Manager Update and Small Business AccountingService Pack 2 for Business Contact Manager Update and Small Business Accounting
    Service Pack 2 for Business Contact Manager Update and Small Business Accounting provides the latest updates to Microsoft Office Small Business Accounting 2006 and Microsoft Office Outlook 2003 with Business Contact Manager Update. This Service Pack contai
    Gigabyte GA-MA770-UD3 (rev. 1.0) Microsoft UAA DriverGigabyte GA-MA770-UD3 (rev. 1.0) Microsoft UAA Driver
    Specifications:CPU: - Support for Socket AM3 / AM2+ / AM2 processors: AMD Phenom FX processor/ AMD Phenom X4 processor/ AMD Phenom X3 processor/ AMD Athlon X2 processor/ AMD Athlon processor/ AMD Sempron X2 processor/ AMD Sempron processor Hyper Transport
    BizTalk Server 2006 Best Practices AnalyzerBizTalk Server 2006 Best Practices Analyzer
    The BizTalk Server 2006 Best Practices Analyzer performs configuration-level verification by reading and reporting only. The Best Practices Analyzer gathers data from different information sources, such as Windows Management Instrumentation (WMI) classes,
    Business Contact Manager for Outlook 2003 Security Update: KB842496Business Contact Manager for Outlook 2003 Security Update: KB842496
    This update addresses a vulnerability in Business Objects Crystal Reports, installed as part of Business Contact Manager installation, which could lead to Information Disclosure and Denial of Service attacks on an affected system. This version is the first
    Microsoft CRM v1.0 Update: KB 829888Microsoft CRM v1.0 Update: KB 829888
    Server Error in/Application error message when you try to run reports in Microsoft CRM. When you try to run reports on a Microsoft Business Solutions CRM server that has a lot of records in the database, when the report that you are running retrieves a lot
    Eucalyptus Wood Stripe Theme SetEucalyptus Wood Stripe Theme Set
    WebSpice Themes apply a style to every page of your Web site for fast creation of resume, personal, business, and intranet pages. The color coordinated Themes include backgrounds, banners, bullets, and navigation buttons. Themes allow you to apply a color-
    Microsoft Exchange Server MTA CheckMicrosoft Exchange Server MTA Check
    Use MTA Check, a command line tool, to check the MTA database consistency of Exchange message transfer agent (MTA) and to repair the MTA database if necessary. MTA Check will analyze and correct problems in the MTA. Run MTA Check if you suspect corruption
    Microsoft Flight Simulator X Standard EditionMicrosoft Flight Simulator X Standard Edition
    Microsoft Flight Simulator X Standard Edition immerses you in a beautifully rich and realistic world with dozens of aircraft and interactive Missions for a completely new and innovative gaming experience. Free Flight lets you fly anywhere in the world, fro
    Update for Outlook 2003 Junk Email Filter (KB892236)Update for Outlook 2003 Junk Email Filter (KB892236)
    Update for Outlook 2003 Junk Email Filter (KB892236) provides the Junk E-mail Filter in Microsoft Office Outlook 2003 with a more current definition of which e-mail messages should be considered junk e-mail. This update was released in March 2005. This ver
    Web Services Enhancements 3.0 Hands On Lab - MessagingWeb Services Enhancements 3.0 Hands On Lab - Messaging
    Learn how to create Web services with Web Services Enhancements 3.0 which extends the .NET Framework 2.0 ASMX Web Services to provide additional messaging abilities such as hosting ASMX Web services in console applications, using MTOM to send binary data e

    » show all

    Similar Applications:

    This program is encryption software that can encrypt multiple files and folders. You can set your own password or let the program generate it for you. For increasing password security you can set to hide password with (*). The program can also be used to j
    MailCloak for FirefoxMailCloak for Firefox
    MailCloak is a groundbreaking new GPG encryption plug-in from Global Web Security Systems (gWebs). MailCloak was designed from the ground up to be the first encryption killer app for IE, FF & mail clients. The Firefox version of MailCloak uses the GNU Priv
    SafeWallet 2.1SafeWallet 2.1
    Protects and manages your password and personal information. Secure and compress files and folders. Powerful and easy to use. Search capability, multiple databases, and cross-platforms. Firefox Web browser integration for Web-form capture and refill. Custo
    File LockFile Lock
    File Lock is a security software product that can restrict access to files and folders: lock files, folders and drives; hide files and folders to make them completely invisible; or password protect files and folders. File Lock protects files and folders wi
    Inzomia Image EncryptInzomia Image Encrypt
    With Inzomia Image Encrypt protecting your photos is easy. Simply select the photos that you want to prevent others from viewing. Encrypted images can be viewed right away in the inzomia image viewer. The free version support unlimited decryption and encry
    Password InspirationPassword Inspiration
    If you can't think of a new password, are forced to use special characters, and are afraid you will forget them, then solve your common password problems with this password generator. Password Inspiration suggests passwords made from lists of positive and
    BestCrypt Volume EncryptionBestCrypt Volume Encryption
    BestCrypt Volume for Disk Encryption protects all data on all types of volumes residing on fixed and removable disks - simple volumes, mount points, multipartition volumes (spanned, mirrored, striped, RAID-5), while also working on UEFI and GPT partitions.
    CryptoFish is very easy to use. It will add "Encrypt with Cryptofish" command to the context menu that appears when you right-click a file in Windows Explorer. It also has built-in key manager and temporary "key memory". CryptoFish features include: Encryp
    Hashy for Windows 8Hashy for Windows 8
    Hashy for Windows 8 is a way to generate MD5, SHA1, SHA256, SHA512, and Base 64 checksums. Pick a file and the application will calculate the checksums, along with the simple 'copy to clipboard' button. It allows quick hash generation and the easy buttons
    Le Pass'Le Pass'
    Le Pass' is an extension tool for Microsoft Internet Explorer to store your usernames and passwords and automatically log you on into your favorite Web sites. With Le Pass', your information is securely stored in a single encrypted file protected by a uniq

    Supported Operating Systems:
    Windows 2000 | 

    Comments on :

    Comments not found



    Enter text from image below:

    Turn on images!


    Windows Software - Free Windows Downloads, Apps, Games, Freeware, Skype, Media Player, Antivirus, Gimp, Live, Starter for Windows XP, Vista, 7, 8, 10

    © Pantich 2016 all rights reserved