Sorry. Any host that accepts messages from the internet (more precisely for this purpose, any host that accepts SMTP/ESMTP verbs from untrusted hosts presumably outside your protected network). -----Original Message----- From: Dee Arnold [mailto:Deea@xxxxxxxx] Sent: Thursday, October 16, 2003 10:56 AM To: [ExchangeList] Subject: [exchangelist] RE: MS Security Bulletin http://www.MSExchange.org/ Excuse my question, could you define "internet facing host"? -----Original Message----- From: Mulnick, Al [mailto:Al.Mulnick@xxxxxxxxxx] Sent: Thursday, October 16, 2003 9:52 AM To: [ExchangeList] Subject: [exchangelist] RE: MS Security Bulletin http://www.MSExchange.org/ I think you have your answer below: authentication could interrupt the flow of mail from outside hosts that don't belong to your organization (as in all of the internet). The workaround is only good if this is not an internet facing host. If it is, it's not a valid workaround. Al -----Original Message----- From: Dee Arnold [mailto:Deea@xxxxxxxx] Sent: Thursday, October 16, 2003 9:49 AM To: [ExchangeList] Subject: [exchangelist] RE: MS Security Bulletin http://www.MSExchange.org/ They have a workaround for this one, but it looks like it could affect incoming email (or my field users using SMTP). I'll take a look at applying the patch, but since I'm going on vacation for a week starting tomorrow, I'm concerned with leaving problems with my backup...What do you think -- patch or workaround? I have exchange 2000 SP3. Workaround: To require SMTP authentication on an Exchange 2000 server: Start Exchange System Manager. Locate the server in the organization tree. Expand the Protocols container for the server. Expand the SMTP container. For each SMTP virtual server: Open the properties and of the virtual server object. Click the Access properties page. Click the Authentication button. Clear the "Anonymous Access" checkbox. Click OK to accept the change. To require SMTP authentication on an Exchange 5.5 server: To require authentication for inbound connections: Click the Connections page. In the "Accept Connections" Section, mark the radio button for "Only from hosts using Authentication." Impact of Workaround: Because most of the SMTP servers on the Internet only support Anonymous Authentication, inbound sessions from external SMTP servers will be affected. -----Original Message----- From: Joshua M. Etterman [mailto:jetterman@xxxxxxxxxxxxxxxxxxxxxxxxxxxx] Sent: Wednesday, October 15, 2003 4:27 PM To: [ExchangeList] Subject: [exchangelist] MS Security Bulletin AD: Get Thawte's New Step-by-Step SSL Guide for MSIIS: http://www.msexchange.org/thawte/ I'm sure everyone else has gotten this, but thought I'd post it FYI! -----BEGIN PGP SIGNED MESSAGE----- - -------------------------------------------------------------------- Title: Microsoft Exchange Server Security Bulletin Summary for October 2003 Issued: October 15, 2003 Version Number: 1.0 Bulletin: http://www.microsoft.com/technet/security/excoct03.asp - -------------------------------------------------------------------- Summary: ======== Included in this advisory are updates for two newly discovered vulnerabilities in Microsoft Exchange Server. These vulnerabilities, broken down by severity are: \\Critical Security Bulletins\\ MS03-046 - Vulnerability in Exchange Server could allow Arbitrary Code Execution (829436) - Affected Software: - Exchange Server 5.5 - Exchange 2000 Server - Impact: Remote Code Execution - Version Number: 1.0 \\Moderate Security Bulletins\\ MS03-047 - Vulnerability in Exchange Server 5.5 Outlook Web Access Could Allow Cross-Site Scripting Attack (828489) - Affected Software: - Exchange Server 5.5 - Impact: Remote Code Execution - Version Number: 1.0 Patch Availability: =================== Patches are available to fix these vulnerabilities. For additional information, including Technical Details, Workarounds, answers to Frequently Asked Questions, and Patch Deployment Information please read the Microsoft Exchange Security Bulletin Summary for October at: http://www.microsoft.com/technet/security/excoct03.asp Acknowledgments: ================ Microsoft thanks the following for working with us to protect customers: - - João Gouveia (joao.gouveia@xxxxxxxxxxxx) for reporting the issue described in MS03-046. - - Ory Segal of Sanctum Inc. (http://www.sanctuminc.com/) for reporting the issue described in MS03-047. Support: ======== Technical support is available from Microsoft Product Support Services at 1-866-PCSAFETY. There is no charge for support calls associated with security patches. Revisions: ========== * V1.0 October 15, 2003: Bulletin Created. ******************************************************************** Protect your PC: Microsoft has provided information on how you can help protect your PC at the following locations: http://www.microsoft.com/technet/security/protect Patch Management Strategies: The Microsoft Guide to Security Patch Management Web Site provides additional information about Microsoft's best practice recommendations for applying security patches: http://www.microsoft.com/technet/security/topics/patch/secpatch/Defaul t.asp IT Pro Security Zone Community: Learn to improve security and optimize your IT infrastructure, and participate with other IT Pros on security topics: http://www.microsoft.com/technet/security/community/default.mspx If you receive an e-mail that claims to be distributing a Microsoft security patch, it is a hoax that may be distributing a virus. Microsoft does not distribute security patches via e-mail. You can learn more about Microsoft's software distribution policies here: http://www.microsoft.com/technet/security/policy/swdist.asp ******************************************************************** - -------------------------------------------------------------------- THE INFORMATION PROVIDED IN THE MICROSOFT KNOWLEDGE BASE IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND. MICROSOFT DISCLAIMS ALL WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING THE WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. IN NO EVENT SHALL MICROSOFT CORPORATION OR ITS SUPPLIERS BE LIABLE FOR ANY DAMAGES WHATSOEVER INCLUDING DIRECT, INDIRECT, INCIDENTAL, CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR SPECIAL DAMAGES, EVEN IF MICROSOFT CORPORATION OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. SOME STATES DO NOT ALLOW THE EXCLUSION OR LIMITATION OF LIABILITY FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES SO THE FOREGOING LIMITATION MAY NOT APPLY. - -------------------------------------------------------------------- -----BEGIN PGP SIGNATURE----- Version: PGP 8.0.2 iQEVAwUBP42V/40ZSRQxA/UrAQGBpQf/QfirolX/+4hkE/oy85o/zOWUkjBlJZTc BGaJ5R4P9NOQGr/cHuYkRj0I4F8GgxzG6/4L/QAeJUUc0ZMW9cz4wTHyVUK9Wvwi CAbPNVV2v0ONeIl3JwTXLDtMnGIOl26NDBbYDTNGeskzN1sX6GtghkFtmchniACN XwOvoauVHVDRwx532wLqsOuTvLXYGhsXAMAg6fvIRgnwqwlh7TiH+46BJaqprwnS PtEG8eStCzsFbLmWe21OtJD1sIB2eOpFBLIjQDc3DIbzZ3keJPwgUi6y9SRTPbA3 L7NLWAE1efQKn50WeI0ZyMAMAdZCXc6bjKEjxVVsj9Gmzb8NJX+5zw== =LAjg -----END PGP SIGNATURE----- ******************************************************************* You have received this e-mail bulletin because of your subscription to the Microsoft Product Security Notification Service. For more information on this service, please visit http://www.microsoft.com/technet/security/notify.asp. To verify the digital signature on this bulletin, please download our PGP key at http://www.microsoft.com/technet/security/notify.asp. To unsubscribe from the Microsoft Security Notification Service, please visit the Microsoft Profile Center at http://register.microsoft.com/regsys/pic.asp If you do not wish to use Microsoft Passport, you can unsubscribe from the Microsoft Security Notification Service via email as described below: Reply to this message with the word UNSUBSCRIBE in the Subject line. For security-related information about Microsoft products, please visit the Microsoft Security Advisor web site at http://www.microsoft.com/security. --- Joshua M. Etterman Complete College Solutions CCS Financial Corporation 513 W. Chocolate Avenue Hershey, PA 17033 Phone: (717) 508-2000 Fax: (717) 508-2001 Email: jetterman@xxxxxxxxxxxxxxxxxxxxxxxxxxxx Get Thawte's New Step-by-Step SSL Guide for MSIIS Find out how to test, purchase, and install a Thawte Digital Certificate on your MSIIS web server: http://www.msexchange.org/thawte/ ------------------------------------------------------ You are currently subscribed to this ISAserver.org Discussion List as: deea@xxxxxxxx To unsubscribe send a blank email to $subst('Email.Unsub') ############################################################################ ######### Only the individual sender is responsible for the content of the message, and the message does not necessarily reflect the position or policy of the Texas State Teachers Association or its affiliates. ------------------------------------------------------ List Archives: http://www.webelists.com/cgi/lyris.pl?enter=exchangelist Exchange Newsletters: http://www.msexchange.org/pages/newsletter.asp Exchange FAQ: http://www.msexchange.org/pages/larticle.asp?type=FAQ ------------------------------------------------------ Other Internet Software Marketing Sites: Leading Network Software Directory: http://www.serverfiles.com No.1 ISA Server Resource Site: http://www.isaserver.org Windows Security Resource Site: http://www.windowsecurity.com/ Network Security Library: http://www.secinf.net/ Windows 2000/NT Fax Solutions: http://www.ntfaxfaq.com ------------------------------------------------------ ------------------------------------------------------ List Archives: http://www.webelists.com/cgi/lyris.pl?enter=exchangelist Exchange Newsletters: http://www.msexchange.org/pages/newsletter.asp Exchange FAQ: http://www.msexchange.org/pages/larticle.asp?type=FAQ ------------------------------------------------------ Other Internet Software Marketing Sites: Leading Network Software Directory: http://www.serverfiles.com No.1 ISA Server Resource Site: http://www.isaserver.org Windows Security Resource Site: http://www.windowsecurity.com/ Network Security Library: http://www.secinf.net/ Windows 2000/NT Fax Solutions: http://www.ntfaxfaq.com ------------------------------------------------------ ############################################################################ ######### Only the individual sender is responsible for the content of the message, and the message does not necessarily reflect the position or policy of the Texas State Teachers Association or its affiliates. ------------------------------------------------------ List Archives: http://www.webelists.com/cgi/lyris.pl?enter=exchangelist Exchange Newsletters: http://www.msexchange.org/pages/newsletter.asp Exchange FAQ: http://www.msexchange.org/pages/larticle.asp?type=FAQ ------------------------------------------------------ Other Internet Software Marketing Sites: Leading Network Software Directory: http://www.serverfiles.com No.1 ISA Server Resource Site: http://www.isaserver.org Windows Security Resource Site: http://www.windowsecurity.com/ Network Security Library: http://www.secinf.net/ Windows 2000/NT Fax Solutions: http://www.ntfaxfaq.com ------------------------------------------------------