New Search

Literal Processing Vulnerability

oval:org.mitre.oval:def:6159

The Electronic Messaging System Microsoft Data Base (EMSMDB32) provider in Microsoft Exchange 2000 Server SP3 and Exchange Server 2003 SP2 as used in Exchange System Attendant allows remote attackers to cause a denial of service (application outage) via a malformed MAPI command aka "Literal Processing Vulnerability."

Family:
windows
Status:
ACCEPTED
Platform(s):
  • Microsoft Windows XP
  • Microsoft Windows 2000
  • Microsoft Windows Server 2003
  • Microsoft Windows Vista
  • Microsoft Windows Server 2008
Class:
vulnerability
Reference(s):
  • CVE-2009-0099
Product(s):
  • Microsoft Exchange Server MAPI Client and Collaboration Data Objects 1.2.1
  • Microsoft Exchange Server 2003
  • Microsoft Exchange Server 2000