CVE-2005-1987

CVSS V2 High 7.5 CVSS V3 None
Description
Buffer overflow in Collaboration Data Objects (CDO), as used in Microsoft Windows and Microsoft Exchange Server, allows remote attackers to execute arbitrary code when CDOSYS or CDOEX processes an e-mail message with a large header name, as demonstrated using the "Content-Type" string.
Overview
  • CVE ID
  • CVE-2005-1987
  • Assigner
  • secure@microsoft.com
  • Vulnerability Status
  • Analyzed
  • Published Version
  • 2005-10-13T10:02:00
  • Last Modified Date
  • 2020-04-09T13:28:52
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
cpe:2.3:a:microsoft:exchange_server:2000:sp3:*:*:*:*:*:* 1 OR
cpe:2.3:o:microsoft:windows_2000:-:sp4:*:fr:*:*:*:* 1 OR
cpe:2.3:o:microsoft:windows_server_2003:-:*:*:*:*:*:itanium:* 1 OR
cpe:2.3:o:microsoft:windows_server_2003:-:*:*:*:*:*:x64:* 1 OR
cpe:2.3:o:microsoft:windows_server_2003:r2:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:microsoft:windows_server_2003:sp1:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:microsoft:windows_server_2003:sp1:*:*:*:*:*:itanium:* 1 OR
cpe:2.3:o:microsoft:windows_xp:-:*:*:*:*:*:x64:* 1 OR
cpe:2.3:o:microsoft:windows_xp:-:sp1:*:*:tablet_pc:*:*:* 1 OR
cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:tablet_pc:*:*:* 1 OR
CVSS Version 2
  • Version
  • 2.0
  • Vector String
  • AV:N/AC:L/Au:N/C:P/I:P/A:P
  • Access Vector
  • NETWORK
  • Access Compatibility
  • LOW
  • Authentication
  • NONE
  • Confidentiality Impact
  • PARTIAL
  • Integrity Impact
  • PARTIAL
  • Availability Impact
  • PARTIAL
  • Base Score
  • 7.5
  • Severity
  • HIGH
  • Exploitability Score
  • 10
  • Impact Score
  • 6.4
References
Reference URL Reference Tags
http://www.us-cert.gov/cas/techalerts/TA05-284A.html Third Party Advisory US Government Resource
http://www.kb.cert.org/vuls/id/883460 Third Party Advisory US Government Resource
http://securitytracker.com/id?1015038 Third Party Advisory VDB Entry
http://securitytracker.com/id?1015039 Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/15067 Third Party Advisory VDB Entry
http://secunia.com/advisories/17167 Third Party Advisory
http://archives.neohapsis.com/archives/fulldisclosure/2005-10/0289.html Broken Link
http://www.osvdb.org/19905 Broken Link
http://marc.info/?l=bugtraq&m=112915118302012&w=2 Mailing List Third Party Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/22495 Third Party Advisory VDB Entry
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A848 Third Party Advisory
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A581 Third Party Advisory
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1515 Third Party Advisory
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1420 Third Party Advisory
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1406 Third Party Advisory
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1201 Third Party Advisory
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1130 Third Party Advisory
http://support.microsoft.com/default.aspx?scid=kb;[LN];Q907245 Patch Vendor Advisory
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-048 Patch Vendor Advisory
History
Created Old Value New Value Data Type Notes
2022-05-10 16:45:10 Added to TrackCVE