#Microsoft and #Exchange starting off 2022 with a 💣as of 00:00UTC with freezing transport of all emails flowing through it On-Prem due to failure converting the new date... 🤦‍♂️. Solution is to disable the AntiMalware Scanning temporarily via Disable-Antimalwarescanning.ps1. 1/x
This is very bad because of the time this is happening and how many people are off for the holidays. Essentially any server that has this issue will defer all mail until this is rectified. H/T to @miketheitguy for the solution: 2/x
This is also confirmed from Microsoft here: docs.microsoft.com/en-us/archive/…. It works for 2016 and I am sure 2019 also. Once the script is run and the transport service restarted, all deferred emails will reprocess and be sent immediately provided you have no other problems. 3/x
The clock is ticking now on servers out there deferring email & hopefully not running out of storage and dropping things or expiring emails that keep getting deferred. Note this is only for On-Prem routed mail it seems and of course 365 is working correctly so it would seem. 4/x
Some organizations still point the MX to On-Prem via a hybrid Exchange box to route mail through separate 3rd party filtering/compliance systems via the "centralized mail transport" option. Therefore, this issue may be significant even if your organization is in the "cloud". 5/5
Bonus Content: Look for Application Event ID: 5300 Source: FIPFS as well as Event ID: 1106 from FIPFS. Additionally you may see cascading errors and timeouts from the MSExchange Antimalware service with Event IDs 3811 and 5801. Lastly you may see Event ID: 1050 from MExRuntime
According to additional research on this issue, this is happening because Microsoft is using a signed int32 for the date and the new date value of 2,201,010,001 is over the max value of "long" int32 being 2,147,483,647. @MSFTExchange - Not sure why it was structured this way??
It appears the first two numbers are the year in the int32 for some reason and the following numbers are month/day/time. Someone was not thinking ahead here. You can quickly patch exchange to use unsigned and we are good till 2043 and hopefully by then this can be structured diff
Additional source for this information: reddit.com/r/sysadmin/com…

• • •

Missing some Tweet in this thread? You can try to force a refresh
 

Keep Current with Joseph Roosen

Joseph Roosen Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @JRoosen

9 Sep 21
MS Office ActiveX CVE-2021-40444 summary:
🎯No macros needed - normal detections & mitigations fail.
🎯No word from MS on patch ETA
🎯Can in some cases be executed in Explorer Preview mode. (RTF older O365 client?) - h/t -
1/x
🎯Defender defs of 1.349.22.0+ (9/2) should catch it if AV is used. MS Identifies as O97M/Donoff.SA (may be ways to mitigate detection)
🎯These are normal docx files & not anything special.
🎯Supposedly Protected mode and/or App Guard will prevent it.
2/x
🎯Potentially up to 1 month of history of general exploitation. h/t-
🎯You can find history of execution in the HKCU hive and payload/c2. h/t-
3/x
Read 10 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Too expensive? Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal

Or Donate anonymously using crypto!

Ethereum

0xfe58350B80634f60Fa6Dc149a72b4DFbc17D341E copy

Bitcoin

3ATGMxNzCUFzxpMCHL5sWSt4DVtS8UqXpi copy

Thank you for your support!

Follow Us on Twitter!

:(