7.5

CVE-2005-1987

Buffer overflow in Collaboration Data Objects (CDO), as used in Microsoft Windows and Microsoft Exchange Server, allows remote attackers to execute arbitrary code when CDOSYS or CDOEX processes an e-mail message with a large header name, as demonstrated using the "Content-Type" string.

Data is provided by the National Vulnerability Database (NVD)
MicrosoftExchange Server Version2000 Updatesp3
MicrosoftWindows 2000 Version- Updatesp4 Langfr
MicrosoftWindows Server 2003 Version- HwPlatformitanium
MicrosoftWindows Server 2003 Version- HwPlatformx64
MicrosoftWindows Server 2003 Versionsp1 HwPlatformitanium
MicrosoftWindows Xp Version- HwPlatformx64
MicrosoftWindows Xp Version- Updatesp1 SwEditiontablet_pc
MicrosoftWindows Xp Version- Updatesp2 SwEditiontablet_pc
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 59.29% 0.982
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 7.5 10 6.4
AV:N/AC:L/Au:N/C:P/I:P/A:P
CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')

The product copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer, leading to a buffer overflow.

http://www.us-cert.gov/cas/techalerts/TA05-284A.html
Third Party Advisory
US Government Resource
http://marc.info/?l=bugtraq&m=112915118302012&w=2
Third Party Advisory
Mailing List
http://securitytracker.com/id?1015038
Third Party Advisory
VDB Entry
http://securitytracker.com/id?1015039
Third Party Advisory
VDB Entry
http://www.kb.cert.org/vuls/id/883460
Third Party Advisory
US Government Resource
http://www.securityfocus.com/bid/15067
Third Party Advisory
VDB Entry