The Electronic Messaging System Microsoft Data Base (EMSMDB32) provider in Microsoft Exchange 2000 Server SP3 and Exchange Server 2003 SP2, as used in Exchange System Attendant, allows remote attackers to cause a denial of service (application outage) via a malformed MAPI command, aka "Literal Processing Vulnerability."
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6159 | vdb entry signature |
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-003 | vendor advisory |
http://osvdb.org/51838 | vdb entry |
http://www.us-cert.gov/cas/techalerts/TA09-041A.html | third party advisory us government resource |
http://secunia.com/advisories/33838 | third party advisory |