Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-w8h6-6x8h-3fj6

Опубликовано: 02 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The Electronic Messaging System Microsoft Data Base (EMSMDB32) provider in Microsoft Exchange 2000 Server SP3 and Exchange Server 2003 SP2, as used in Exchange System Attendant, allows remote attackers to cause a denial of service (application outage) via a malformed MAPI command, aka "Literal Processing Vulnerability."

The Electronic Messaging System Microsoft Data Base (EMSMDB32) provider in Microsoft Exchange 2000 Server SP3 and Exchange Server 2003 SP2, as used in Exchange System Attendant, allows remote attackers to cause a denial of service (application outage) via a malformed MAPI command, aka "Literal Processing Vulnerability."

EPSS

Процентиль: 99%
0.71059
Высокий

Дефекты

CWE-20

Связанные уязвимости

nvd
почти 17 лет назад

The Electronic Messaging System Microsoft Data Base (EMSMDB32) provider in Microsoft Exchange 2000 Server SP3 and Exchange Server 2003 SP2, as used in Exchange System Attendant, allows remote attackers to cause a denial of service (application outage) via a malformed MAPI command, aka "Literal Processing Vulnerability."

EPSS

Процентиль: 99%
0.71059
Высокий

Дефекты

CWE-20