Security Bulletin

Microsoft Security Bulletin MS99-027 - Critical

Patch Available for "Encapsulated SMTP Address" Vulnerability

Published: August 06, 1999 | Updated: March 21, 2003

Version: 2.0

Patch Availability Information Updated: March 21, 2003

Originally Posted: August 06, 1999

Summary

Microsoft has released a patch that eliminates a security vulnerability in Microsoft® Exchange® Server. The vulnerability could allow an attacker to perform mail relaying via an Exchange server that is configured to act as a gateway for other Exchange sites, using the Internet Messaging Service.

Frequently asked questions regarding this vulnerability can be found at https://www.microsoft.com/technet/security/bulletin/fq99-027.mspx

Issue

Exchange Server implements features designed to defeat "mail relaying", a practice in which an attacker causes an e-mail server to forward mail from the attacker, as though the server were the sender of the mail. However, a vulnerability exists in this feature, and could allow an attacker to circumvent the anti-relaying features in an Internet-connected Exchange Server.

The vulnerability lies in the way that site-to-site relaying is performed via SMTP. Encapsulated SMTP addresses could be used to send mail to any desired e-mail address. The patch eliminates the vulnerability by making encapsulated SMTP addresses subject to the same anti-relay protections as non-encapsulated SMTP addresses.

Affected Software Versions

  • Microsoft Exchange Server 5.5

Vulnerability Identifier: CVE-1999-0682

Patch Availability

More Information

Please see the following references for more information related to this issue.

Obtaining Support on this Issue

This is a fully supported patch. Information on contacting Microsoft Technical Support is available at </https:>https:.

Acknowledgments

Microsoft acknowledges Laurent Frinking of Quark Deutschland GmbH for bringing this issue to our attention and working with us to alert customers about it.

Revisions

  • August 06, 1999: Bulletin Created.
  • V2.0 (March 21, 2003): Introduced versioning and updated patch availability information.

For additional security-related information about Microsoft products, please visit https://www.microsoft.com/technet/security

THE INFORMATION PROVIDED IN THE MICROSOFT KNOWLEDGE BASE IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND. MICROSOFT DISCLAIMS ALL WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING THE WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. IN NO EVENT SHALL MICROSOFT CORPORATION OR ITS SUPPLIERS BE LIABLE FOR ANY DAMAGES WHATSOEVER INCLUDING DIRECT, INDIRECT, INCIDENTAL, CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR SPECIAL DAMAGES, EVEN IF MICROSOFT CORPORATION OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. SOME STATES DO NOT ALLOW THE EXCLUSION OR LIMITATION OF LIABILITY FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES SO THE FOREGOING LIMITATION MAY NOT APPLY.

Built at 2014-04-18T13:49:36Z-07:00 </https:>