Literal Processing VulnerabilityID: oval:org.mitre.oval:def:6159 | Date: (C)2009-02-10 (M)2022-10-10 |
Class: VULNERABILITY | Family: windows |
The Electronic Messaging System Microsoft Data Base (EMSMDB32) provider in Microsoft Exchange 2000 Server SP3 and Exchange Server 2003 SP2, as used in Exchange System Attendant, allows remote attackers to cause a denial of service (application outage) via a malformed MAPI command, aka "Literal Processing Vulnerability."
Platform: |
Microsoft Windows 2000 |
Microsoft Windows XP |
Microsoft Windows Vista |
Microsoft Windows Server 2003 |
Microsoft Windows Server 2008 |
Product: |
Microsoft Exchange 2000 Server |
Microsoft Exchange Server 2003 |
Microsoft Exchange Server MAPI Client and Collaboration Data Objects 1.2.1 |