First published: Wed Apr 14 2010(Updated: )
The SMTP component in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, and Server 2008 Gold, SP2, and R2, and Exchange Server 2003 SP2, does not properly parse MX records, which allows remote DNS servers to cause a denial of service (service outage) via a crafted response to a DNS MX record query, aka "SMTP Server MX Record Vulnerability."
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Windows 2000 | =sp4 | |
Microsoft Windows XP | =sp3 | |
Microsoft Windows XP | =sp2 | |
Microsoft Windows XP | =sp2 | |
Microsoft Windows Server | =sp2 | |
Microsoft Windows Server 2003 | =sp2 | |
Microsoft Windows Server | =sp2 | |
Microsoft Windows Server | =sp2 | |
Microsoft Windows Server | ||
Microsoft Windows Server | =r2 | |
Microsoft Windows Server | =sp2 | |
Microsoft Exchange Server | =2000-sp3 | |
Microsoft Exchange Server | =2003-sp2 | |
Microsoft Exchange Server | =2007-sp2 | |
Microsoft Exchange Server | =2007-sp1 | |
Microsoft Exchange Server | =2010 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-0024 is classified as a denial of service vulnerability, potentially affecting the availability of services.
To remediate CVE-2010-0024, it is recommended to apply the latest security updates provided by Microsoft for the affected systems.
CVE-2010-0024 affects Microsoft Windows 2000 SP4, Windows XP SP2 and SP3, Windows Server 2003 SP2, and several editions of Exchange Server 2003.
Yes, CVE-2010-0024 can be exploited remotely through crafted DNS responses.
Commonly impacted systems include Microsoft Windows operating systems from the Windows 2000 era up to Windows Server 2008, as well as Exchange Server 2003.