January 23, 2022

TheCyberThrone

Thinking Security ! Always

Jingle Bells For Microsoft Exchange Servers on New Year Day

The New Year was a time to spend with family and friends and a time to form loose and hopeful pacts in the form of New Year’s resolutions. For sysadmins responsible for Exchange servers, it’s been a much different story as Microsoft Exchange servers have not been able to properly process the new date, and therefore, can’t process mail.

Microsoft released a bad update, aptly named “220101001”. This was presumably a scheduled patch to allow for processing the new date, but it didn’t go as planned. “A bunch of errors from FIPFS service which say: Cannot convert “220101001” to long,”.

Advertisements

Microsoft Exchange servers have stopped processing mail altogether because it isn’t prepared to handle today’s date,“The reason for this is because Microsoft is using a signed int32 for the date and with the new value of 2.201.010.001 is over the max value of the “long” int being 2.147.483.647.”

The most troubling part of this is the stop-gap solution. In order to resume processing of mail, sysadmins are disabling malware scanning on their exchange servers, leaving their users, and possibly the servers themselves, vulnerable to attack.

The bug affects Exchange Server 2013. 2016, and 2019.

%d bloggers like this: