Vulnerabilities > CVE-2002-0055 - Incorrect Resource Transfer Between Spheres vulnerability in Microsoft Exchange Server, Windows 2000 and Windows XP

047910
CVSS 5.0 - MEDIUM
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
NONE
Integrity impact
NONE
Availability impact
PARTIAL
network
low complexity
microsoft
CWE-669
nessus

Summary

SMTP service in Microsoft Windows 2000, Windows XP Professional, and Exchange 2000 allows remote attackers to cause a denial of service via a command with a malformed data transfer (BDAT) request.

Vulnerable Configurations

Part Description Count
Application
Microsoft
3
OS
Microsoft
4

Nessus

  • NASL familySMTP problems
    NASL idMSSMTP_DOS.NASL
    descriptionIt is possible to make the remote SMTP server fail and restart by sending specially crafted
    last seen2020-06-01
    modified2020-06-02
    plugin id10885
    published2002-03-08
    reporterThis script is Copyright (C) 2002-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/10885
    titleMicrosoft Windows SMTP Service Malformed BDAT Request Remote DoS
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    
    
    include("compat.inc");
    
    if (description)
    {
     script_id(10885);
     script_version("1.34");
     script_cvs_date("Date: 2018/11/15 20:50:24");
    
     script_cve_id("CVE-2002-0055");
     script_bugtraq_id(4204);
     script_xref(name:"MSFT", value:"MS02-012");
     script_xref(name:"MSKB", value:"313450");
    
     script_name(english:"Microsoft Windows SMTP Service Malformed BDAT Request Remote DoS");
     script_summary(english:"Checks if the remote SMTP server can be restarted");
    
     script_set_attribute(attribute:"synopsis", value:
    "The remote SMTP server is affected by a denial of service
    vulnerability.");
     script_set_attribute(attribute:"description", value:
    "It is possible to make the remote SMTP server fail and restart by
    sending specially crafted 'BDAT' requests.
    
    The service will restart automatically, but all the connections
    established at the time of the attack will be dropped.
    
    An attacker may use this flaw to make mail delivery to your site
    less efficient.");
     script_set_attribute(attribute:"see_also", value:"https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2002/ms02-012");
     script_set_attribute(attribute:"see_also", value:"https://marc.info/?l=bugtraq&m=101558498401274&w=2");
     # http://web.archive.org/web/20020417221630/http://www.digitaloffense.net/mssmtp/mssmtp_dos.pl
     script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?ee067e2c");
     script_set_attribute(attribute:"solution", value:
    "Apply the patch referenced above.");
     script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P");
     script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
     script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
     script_set_attribute(attribute:"exploit_available", value:"false");
    
     script_set_attribute(attribute:"plugin_publication_date", value:"2002/03/08");
     script_set_attribute(attribute:"vuln_publication_date", value:"2002/03/06");
     script_set_attribute(attribute:"plugin_type", value:"remote");
     script_end_attributes();
    
     script_category(ACT_ATTACK);
     script_copyright(english:"This script is Copyright (C) 2002-2018 Tenable Network Security, Inc.");
     script_family(english:"SMTP problems");
     script_dependencie("smtpserver_detect.nasl");
     script_require_ports("Services/smtp", 25);
     exit(0);
    }
    
    #
    # The script code starts here
    #
    
    include("misc_func.inc");
    include("smtp_func.inc");
    
    port = get_service(svc:"smtp", default: 25, exit_on_fail: 1);
    if (get_kb_item('SMTP/'+port+'/broken')) exit(0);
    
     soc = open_sock_tcp(port);
     if(!soc)exit(0);
     data = smtp_recv_banner(socket:soc);
     crp = 'HELO example.com\r\n';
     send(socket:soc, data:crp);
     data = recv_line(socket:soc, length:1024);
     if(!(ereg(pattern:"^250 .* Hello .*", string:data)))exit(0);
    
    
     crp = 'MAIL FROM: [email protected]\r\n';
    
     send(socket:soc, data:crp);
     data = recv_line(socket:soc, length:1024);
     crp = 'RCPT TO: Administrator\r\n';
     send(socket:soc, data:crp);
     data = recv_line(socket:soc, length:1024);
     crp = 'BDAT 4\r\n';
     send(socket:soc, data:crp);
     crp = 'b00mAUTH LOGIN\r\n';
     send(socket:soc, data:crp);
     r = recv_line(socket:soc, length:255);
     if(ereg(pattern:"^250 .*", string:r))
     {
     r = recv_line(socket:soc, length:5);
    
    
     # Patched server say : "503 5.5.2 BDAT Expected"
     # Vulnerable servers say : "334 VXNlcm5hbWU6"
     if(ereg(pattern:"^334 .*",string:r))
     		security_warning(port);
     }
    smtp_close(socket: soc);
    
  • NASL familyWindows : Microsoft Bulletins
    NASL idSMB_NT_MS02-012.NASL
    descriptionThe remote host contains a flaw in its SMTP service that could allow an attacker to crash it. Vulnerable services are SMTP service (Windows XP/Windows 2000) and Exchange 2000 (Windows 2000).
    last seen2020-06-01
    modified2020-06-02
    plugin id20885
    published2007-03-28
    reporterThis script is Copyright (C) 2007-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/20885
    titleMS02-012: Malformed Data Transfer Request can Cause Windows SMTP Service to Fail (313450)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    
    include("compat.inc");
    
    if (description)
    {
     script_id(20885);
     script_version("1.29");
     script_cvs_date("Date: 2018/11/15 20:50:29");
    
     script_cve_id("CVE-2002-0055");
     script_bugtraq_id(4204);
     script_xref(name:"MSFT", value:"MS02-012");
     script_xref(name:"MSKB", value:"313450");
    
     script_name(english:"MS02-012: Malformed Data Transfer Request can Cause Windows SMTP Service to Fail (313450)");
     script_summary(english:"Checks for MS Hotfix Q313450");
    
     script_set_attribute(attribute:"synopsis", value:"It is possible to crash the mail service.");
     script_set_attribute(attribute:"description", value:
    "The remote host contains a flaw in its SMTP service that could allow an
    attacker to crash it.
    
    Vulnerable services are SMTP service (Windows XP/Windows 2000) and
    Exchange 2000 (Windows 2000).");
     script_set_attribute(attribute:"see_also", value:"https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2002/ms02-012");
     script_set_attribute(attribute:"solution", value:"Microsoft has released a set of patches for Windows XP and 2000.");
     script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P");
     script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
     script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L");
     script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
     script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
     script_set_attribute(attribute:"exploit_available", value:"false");
    
     script_set_attribute(attribute:"vuln_publication_date", value:"2002/02/27");
     script_set_attribute(attribute:"patch_publication_date", value:"2002/02/27");
     script_set_attribute(attribute:"plugin_publication_date", value:"2007/03/28");
    
     script_set_attribute(attribute:"plugin_type", value:"local");
     script_set_attribute(attribute:"cpe", value:"cpe:/o:microsoft:windows");
     script_set_attribute(attribute:"cpe", value:"cpe:/a:microsoft:exchange_server");
     script_end_attributes();
    
     script_category(ACT_GATHER_INFO);
     script_copyright(english:"This script is Copyright (C) 2007-2018 Tenable Network Security, Inc.");
     script_family(english:"Windows : Microsoft Bulletins");
    
     script_dependencies("smb_hotfixes.nasl", "ms_bulletin_checks_possible.nasl");
     script_require_keys("SMB/MS_Bulletin_Checks/Possible");
     script_require_ports(139, 445, 'Host/patch_management_checks');
     exit(0);
    }
    
    include("audit.inc");
    include("smb_func.inc");
    include("smb_hotfixes.inc");
    include("smb_hotfixes_fcheck.inc");
    include("misc_func.inc");
    
    get_kb_item_or_exit("SMB/MS_Bulletin_Checks/Possible");
    
    bulletin = 'MS02-012';
    kb = '313450';
    
    kbs = make_list(kb);
    if (get_kb_item("Host/patch_management_checks")) hotfix_check_3rd_party(bulletin:bulletin, kbs:kbs, severity:SECURITY_WARNING);
    
    get_kb_item_or_exit("SMB/Registry/Enumerated");
    get_kb_item_or_exit("SMB/WindowsVersion", exit_code:1);
    
    if (hotfix_check_sp_range(win2k:'2', xp:'0') <= 0) audit(AUDIT_OS_SP_NOT_VULN);
    
    rootfile = hotfix_get_systemroot();
    if (!rootfile) exit(1, "Failed to get the system root.");
    
    share = hotfix_path2share(path:rootfile);
    if (!is_accessible_share(share:share)) audit(AUDIT_SHARE_FAIL, share);
    
    if (
      hotfix_is_vulnerable(os:"5.1", sp:0, file:"Smtpsvc.dll", version:"6.0.2600.28", dir:"\system32", bulletin:bulletin, kb:kb) ||
      hotfix_is_vulnerable(os:"5.0", file:"Smtpsvc.dll", version:"5.0.2195.4905", dir:"\system32", bulletin:bulletin, kb:kb)
    )
    {
      set_kb_item(name:"SMB/Missing/"+bulletin, value:TRUE);
      hotfix_security_warning();
      hotfix_check_fversion_end();
      exit(0);
    }
    else
    {
      hotfix_check_fversion_end();
      audit(AUDIT_HOST_NOT, 'affected');
    }
    
    
    

Oval

accepted2011-05-16T04:02:41.296-04:00
classvulnerability
contributors
  • nameTiffany Bergeron
    organizationThe MITRE Corporation
  • nameAndrew Buttner
    organizationThe MITRE Corporation
  • nameShane Shaffer
    organizationG2, Inc.
  • nameSudhir Gandhe
    organizationTelos
  • nameShane Shaffer
    organizationG2, Inc.
descriptionSMTP service in Microsoft Windows 2000, Windows XP Professional, and Exchange 2000 allows remote attackers to cause a denial of service via a command with a malformed data transfer (BDAT) request.
familywindows
idoval:org.mitre.oval:def:30
statusaccepted
submitted2003-05-20T12:00:00.000-04:00
titleMicrosoft SMTP Malformed BDAT Request Denial of Service
version32