Computer Security
[EN] securityvulns.ru
no-pyccku

  

Microsoft Windows Mail / Outlook Express integer overflow
Published:11.05.2010
Source:MICROSOFT
SecurityVulns ID:10821
Type:client
Level:5/10
Description:Integer overflow on POP3 or IMAP server reply parsing.
Affected:MICROSOFT : Windows 2000 Server
 MICROSOFT : Windows 2000 Professional
 MICROSOFT : Windows XP
 MICROSOFT : Windows 2003 Server
 MICROSOFT : Windows Vista
 MICROSOFT : Windows 2008 Server
 MICROSOFT : Windows 7
CVE:CVE-2010-0816 (Integer overflow in inetcomm.dll in Microsoft Outlook Express 5.5 SP2, 6, and 6 SP1; Windows Live Mail on Windows XP SP2 and SP3, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7; and Windows Mail on Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7 allows remote e-mail servers and man-in-the-middle attackers to execute arbitrary code via a crafted (1) POP3 or (2) IMAP response, as demonstrated by a certain +OK response on TCP port 110, aka "Outlook Express and Windows Mail Integer Overflow Vulnerability.")
Original documentdocumentFrancis Provencher, {PRL} Microsoft Windows Outlook Express and Windows Mail Integer Overflow (11.05.2010)
 documentFrancis Provencher, {PRL} Microsoft Windows Outlook Express and Windows Mail Integer Overflow (11.05.2010)
 documentMICROSOFT, Microsoft Security Bulletin MS10-030 - Critical Vulnerability in Outlook Express and Windows Mail Could Allow Remote Code Execution (978542) (11.05.2010)
Files:Microsoft Security Bulletin MS10-030 - Critical Vulnerability in Outlook Express and Windows Mail Could Allow Remote Code Execution (978542)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod

 
 



Rating@Mail.ru