Anfälligkeitssuche        Suche in 219043 CVE Beschreibungen
und 99761 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.800083
Kategorie:Denial of Service
Titel:Microsoft Outlook Express Malformed MIME Message DoS Vulnerability
Zusammenfassung:The host is installed with Microsoft Outlook Express and is prone; to denial of service vulnerability.
Beschreibung:Summary:
The host is installed with Microsoft Outlook Express and is prone
to denial of service vulnerability.

Vulnerability Insight:
Flaw is due to improper handling of multipart/mixed e-mail messages
with many MIME parts and e-mail messages with many Content-type: message/rfc822
headers in MimeOleClearDirtyTree function of InetComm.dll file.

Vulnerability Impact:
Successful exploitation could result in application to crash.

Affected Software/OS:
Microsoft Outlook Express 6.x to 6.00.2900.5512.

Solution:
No known solution was made available for at least one year since the disclosure
of this vulnerability. Likely none will be provided anymore. General solution options are to upgrade to a newer
release, disable respective features, remove the product or replace the product by another one.

CVSS Score:
4.3

CVSS Vector:
AV:N/AC:M/Au:N/C:N/I:N/A:P

Querverweis: BugTraq ID: 32702
Common Vulnerability Exposure (CVE) ID: CVE-2008-5424
http://www.securityfocus.com/bid/32702
Bugtraq: 20081208 DoS attacks on MIME-capable software via complex MIME emails (Google Search)
http://www.securityfocus.com/archive/1/499038/100/0/threaded
Bugtraq: 20081209 Re: DoS attacks on MIME-capable software via complex MIME emails (Google Search)
http://www.securityfocus.com/archive/1/499045/100/0/threaded
http://mime.recurity.com/cgi-bin/twiki/view/Main/AttackIntro
http://securityreason.com/securityalert/4721
CopyrightCopyright (C) 2008 Greenbone Networks GmbH

Dies ist nur einer von 99761 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2024 E-Soft Inc. Alle Rechte vorbehalten.