[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

253164

 
 

909

 
 

197077

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

Literal Processing Vulnerability

ID: oval:org.mitre.oval:def:6159Date: (C)2009-02-10   (M)2022-10-10
Class: VULNERABILITYFamily: windows




The Electronic Messaging System Microsoft Data Base (EMSMDB32) provider in Microsoft Exchange 2000 Server SP3 and Exchange Server 2003 SP2, as used in Exchange System Attendant, allows remote attackers to cause a denial of service (application outage) via a malformed MAPI command, aka "Literal Processing Vulnerability."

Platform:
Microsoft Windows 2000
Microsoft Windows XP
Microsoft Windows Vista
Microsoft Windows Server 2003
Microsoft Windows Server 2008
Product:
Microsoft Exchange 2000 Server
Microsoft Exchange Server 2003
Microsoft Exchange Server MAPI Client and Collaboration Data Objects 1.2.1
Reference:
CVE-2009-0099
CVE    1
CVE-2009-0099
CPE    2
cpe:/a:microsoft:exchange_server:2000:sp3
cpe:/a:microsoft:exchange_server:2003:sp2

© SecPod Technologies