Security Bulletin
Microsoft Security Bulletin MS99-027 - Critical
Patch Available for "Encapsulated SMTP Address" Vulnerability
Published: August 06, 1999 | Updated: March 21, 2003
Version: 2.0
Patch Availability Information Updated: March 21, 2003
Originally Posted: August 06, 1999
Summary
Microsoft has released a patch that eliminates a security vulnerability in Microsoft® Exchange® Server. The vulnerability could allow an attacker to perform mail relaying via an Exchange server that is configured to act as a gateway for other Exchange sites, using the Internet Messaging Service.
Frequently asked questions regarding this vulnerability can be found at https://www.microsoft.com/technet/security/bulletin/fq99-027.mspx
Issue
Exchange Server implements features designed to defeat "mail relaying", a practice in which an attacker causes an e-mail server to forward mail from the attacker, as though the server were the sender of the mail. However, a vulnerability exists in this feature, and could allow an attacker to circumvent the anti-relaying features in an Internet-connected Exchange Server.
The vulnerability lies in the way that site-to-site relaying is performed via SMTP. Encapsulated SMTP addresses could be used to send mail to any desired e-mail address. The patch eliminates the vulnerability by making encapsulated SMTP addresses subject to the same anti-relay protections as non-encapsulated SMTP addresses.
Affected Software Versions
- Microsoft Exchange Server 5.5
Vulnerability Identifier: CVE-1999-0682
Patch Availability
More Information
Please see the following references for more information related to this issue.
- Microsoft Security Bulletin MS99-027: Frequently Asked Questions, https://www.microsoft.com/technet/security/bulletin/fq99-027.mspx.
- Microsoft Knowledge Base (KB) article 237927, XIMS: Messages Sent to Encapsulated SMTP Address Are Rerouted Even Though Rerouting Is Disabled, </https:>https:.
- Microsoft Security web site, </https:>https:.
- IIS Security Checklist, </https:>https:.
Obtaining Support on this Issue
This is a fully supported patch. Information on contacting Microsoft Technical Support is available at </https:>https:.
Acknowledgments
Microsoft acknowledges Laurent Frinking of Quark Deutschland GmbH for bringing this issue to our attention and working with us to alert customers about it.
Revisions
- August 06, 1999: Bulletin Created.
- V2.0 (March 21, 2003): Introduced versioning and updated patch availability information.
For additional security-related information about Microsoft products, please visit https://www.microsoft.com/technet/security
THE INFORMATION PROVIDED IN THE MICROSOFT KNOWLEDGE BASE IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND. MICROSOFT DISCLAIMS ALL WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING THE WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. IN NO EVENT SHALL MICROSOFT CORPORATION OR ITS SUPPLIERS BE LIABLE FOR ANY DAMAGES WHATSOEVER INCLUDING DIRECT, INDIRECT, INCIDENTAL, CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR SPECIAL DAMAGES, EVEN IF MICROSOFT CORPORATION OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. SOME STATES DO NOT ALLOW THE EXCLUSION OR LIMITATION OF LIABILITY FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES SO THE FOREGOING LIMITATION MAY NOT APPLY.
Built at 2014-04-18T13:49:36Z-07:00 </https:>