{"vuid":"VU#435963","idnumber":"435963","name":"Microsoft Windows 2000 SMTP service fails to properly authenticate credentials of unauthorized user (MS01-037)","keywords":["Microsoft Windows 2000","SMTP service","authentication","credentials","unauthorized user","mail relaying","port 25","MS01-037"],"overview":"A vulnerability exists in the SMTP service installed by default on Microsoft Windows 2000 Server (and optionally on Windows 2000 professional) that could allow an intruder to use the service to send mail.","clean_desc":"The Simple Mail Transfer Protocol (SMTP) is the standard protocol used to transport mail across the Internet. Microsoft Windows 2000 Server contains an SMTP server that requires authentication before users are permitted to send mail. A flaw in the way the server handles authentication could permit an intruder to use the service to send mail without providing genuine credentials. For more information, see Microsoft security bulletin MS01-037. It should be noted that even in the best of circumstances, SMTP is a very difficult to authenticate without end-to-end cryptographic solutions. Quoting from RFC 2821: SMTP mail is inherently insecure in that it is feasible for even fairly casual users to negotiate directly with receiving and relaying SMTP servers and create messages that will trick a naive recipient into believing that they came from somewhere else. Constructing such a message so that the \"spoofed\" behavior cannot be detected by an expert is somewhat more difficult, but not sufficiently so as to be a deterrent to someone who is determined and knowledgeable. Consequently, as knowledge of Internet mail increases, so does the knowledge that SMTP mail inherently cannot be authenticated, or integrity checks provided, at the transport level. Real mail security lies only in end-to-end methods involving the message bodies, such as those which use digital signatures...","impact":"Intruders may be able to send mail through a vulnerable server in violation of local security policies.","resolution":"The CERT/CC is currently unaware of a general purpose solution to this problem without strong digital signatures on all mail messages. To address the specific problem in the Microsoft SMTP server, apply a patch as described in  MS01-037.","workarounds":"","sysaffected":"","thanks":"","author":"This document was written by Shawn V. Hernan.","public":["http://www.microsoft.com/technet/security/bulletin/MS01-037.asp","http://www.securityfocus.com/bid/2988","http://www.ietf.org/rfc/rfc2821.txt?number=2821","http://www.ietf.org/rfc/rfc2822.txt?number=2822"],"cveids":["CVE-2001-0504"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2001-07-06T12:46:15Z","publicdate":"2001-07-05T00:00:00Z","datefirstpublished":"2001-08-18T02:58:14Z","dateupdated":"2001-08-18T03:00:19Z","revision":5,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"18","cam_exploitation":"20","cam_internetinfrastructure":"0","cam_population":"20","cam_impact":"1","cam_easeofexploitation":"20","cam_attackeraccessrequired":"20","cam_scorecurrent":"5.7","cam_scorecurrentwidelyknown":"6","cam_scorecurrentwidelyknownexploited":"6","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":5.7,"vulnote":null}