Vulnerability Note VU#422156

Microsoft Exchange Server fails to properly handle specially crafted SMTP extended verb requests

Original Release date: 15 Oct 2003 | Last revised: 22 Oct 2003


Microsoft Exchange fails to handle certain SMTP extended verbs correctly. In Exchange 5.5, this can lead to a denial-of-service condition. In Exchange 2000, this could permit an attacker to run arbitrary code.


Microsoft Exchange is a popular collaboration product which includes extensive support for electronic mail, including support for SMTP. SMTP is a standard protocol for exchanging electronic mail over the internet. Exchange uses SMTP to communicate special handling instructions from one Exchange server to another through the use of SMTP extended verbs. Exchange fails to process some of these commands correctly. On Exchange 5.5, the failure can result in a denial of service condition, and on Exchange 2000, it could result in an attacker running arbitrary code. For more information, see Microsoft Security Bulletin MS03-046.


An attacked could cause a denial of service condition against Exchange 5.5 or execute arbitrary code against Exchange 2000.


Apply a patch as described in Microsoft Security Bulletin MS03-046.

Systems Affected (Learn More)

VendorStatusDate NotifiedDate Updated
Microsoft CorporationAffected-15 Oct 2003
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

Group Score Vector
Base N/A N/A
Temporal N/A N/A
Environmental N/A N/A



Thanks to Microsoft for reporting this vulnerability. Microsoft has credited Joćo Gouveia for reporting this vulnerability.

This document was written by Shawn Hernan based on information contained in Microsoft Security Bulletin MS03-046.

Other Information

  • CVE IDs: CAN-2003-0714
  • CERT Advisory: CA-2003-27
  • Date Public: 15 Oct 2003
  • Date First Published: 15 Oct 2003
  • Date Last Updated: 22 Oct 2003
  • Severity Metric: 40.08
  • Document Revision: 5


If you have feedback, comments, or additional information about this vulnerability, please send us email.