Vulnerability Name:

CVE-2005-1987 (CCN-22495)

Assigned:2005-10-11
Published:2005-10-11
Updated:2020-04-09
Summary:Buffer overflow in Collaboration Data Objects (CDO), as used in Microsoft Windows and Microsoft Exchange Server, allows remote attackers to execute arbitrary code when CDOSYS or CDOEX processes an e-mail message with a large header name, as demonstrated using the "Content-Type" string.
CVSS v3 Severity:7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): Low
CVSS v2 Severity:7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
7.5 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
Vulnerability Type:CWE-120
Vulnerability Consequences:Gain Access
References:Source: FULLDISC
Type: Broken Link
20051012 [SEC-1 Advisory] Collaboration Data Objects Buffer Overflow Vulnerability

Source: MITRE
Type: CNA
CVE-2005-1987

Source: BUGTRAQ
Type: Mailing List, Third Party Advisory
20051012 [SEC-1 Advisory] Collaboration Data Objects Buffer Overflow Vulnerability

Source: CCN
Type: SA17167
Microsoft Collaboration Data Objects Buffer Overflow Vulnerability

Source: SECUNIA
Type: Third Party Advisory
17167

Source: CCN
Type: SECTRACK ID: 1015038
Microsoft Exchange Buffer Overflow in Collaboration Data Objects Lets Remote Users Execute Arbitrary Code

Source: SECTRACK
Type: Third Party Advisory, VDB Entry
1015038

Source: CCN
Type: SECTRACK ID: 1015039
Microsoft Windows Buffer Overflow in Collaboration Data Objects Lets Remote Users Execute Arbitrary Code

Source: SECTRACK
Type: Third Party Advisory, VDB Entry
1015039

Source: MSKB
Type: Patch, Vendor Advisory
Q907245

Source: CCN
Type: NORTEL BULLETIN ID: 2008008958, Rev 1
Centrex IP Client Manager (CICM) response to Microsoft July security bulletin

Source: CCN
Type: US-CERT VU#883460
Microsoft Collaboration Data Objects buffer overflow

Source: CERT-VN
Type: Third Party Advisory, US Government Resource
VU#883460

Source: CCN
Type: Microsoft Security Bulletin MS05-048
Vulnerability in the Microsoft Collaboration Data Objects Could Allow Remote Code Execution (907245)

Source: CCN
Type: Microsoft Security Bulletin MS06-019
Vulnerability in Microsoft Exchange Could Allow Remote Code Execution (916803)

Source: CCN
Type: Microsoft Security Bulletin MS07-026
Vulnerabilities in Microsoft Exchange Could Allow Remote Code Execution (931832)

Source: CCN
Type: Microsoft Security Bulletin MS08-039
Vulnerabilities in Outlook Web Access for Exchange Server Could Allow Elevation of Privilege (953747)

Source: CCN
Type: Microsoft Security Bulletin MS09-003
Vulnerabilities in Microsoft Exchange Could Allow Remote Code Execution (959239)

Source: OSVDB
Type: Broken Link
19905

Source: CCN
Type: OSVDB ID: 19905
Microsoft Collaboration Data Objects Remote Overflow

Source: BID
Type: Third Party Advisory, VDB Entry
15067

Source: CCN
Type: BID-15067
Microsoft Collaboration Data Objects Remote Buffer Overflow Vulnerability

Source: CERT
Type: Third Party Advisory, US Government Resource
TA05-284A

Source: MS
Type: Patch, Vendor Advisory
MS05-048

Source: XF
Type: Third Party Advisory, VDB Entry
win-cdo-bo(22495)

Source: XF
Type: UNKNOWN
win-cdo-bo(22495)

Source: OVAL
Type: Third Party Advisory
oval:org.mitre.oval:def:1130

Source: OVAL
Type: Third Party Advisory
oval:org.mitre.oval:def:1201

Source: OVAL
Type: Third Party Advisory
oval:org.mitre.oval:def:1406

Source: OVAL
Type: Third Party Advisory
oval:org.mitre.oval:def:1420

Source: OVAL
Type: Third Party Advisory
oval:org.mitre.oval:def:1515

Source: OVAL
Type: Third Party Advisory
oval:org.mitre.oval:def:581

Source: OVAL
Type: Third Party Advisory
oval:org.mitre.oval:def:848

Vulnerable Configuration:Configuration 1:
  • cpe:/a:microsoft:exchange_server:2000:sp3:*:*:*:*:*:*

  • Configuration 2:
  • cpe:/o:microsoft:windows_2000:-:sp4:*:fr:*:*:*:*
  • OR cpe:/o:microsoft:windows_server_2003:-:*:*:*:*:*:itanium:*
  • OR cpe:/o:microsoft:windows_server_2003:-:*:*:*:*:*:x64:*
  • OR cpe:/o:microsoft:windows_server_2003:r2:-:*:*:-:*:-:*
  • OR cpe:/o:microsoft:windows_server_2003:sp1:*:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_server_2003:sp1:*:*:*:*:*:itanium:*
  • OR cpe:/o:microsoft:windows_xp:-:*:*:*:*:*:x64:*
  • OR cpe:/o:microsoft:windows_xp:-:sp1:*:*:tablet_pc:*:*:*
  • OR cpe:/o:microsoft:windows_xp:-:sp2:*:*:tablet_pc:*:*:*

  • Configuration CCN 1:
  • cpe:/o:microsoft:windows_xp:-:sp1:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_2000:-:sp4:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows:2003_server::x64:*:*:*:*:*
  • OR cpe:/o:microsoft:windows:xp:sp2:*:*:*:*:*:*
  • OR cpe:/a:microsoft:exchange_server:2000:sp3:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_2003_server:-::~~~~itanium~:*:*:*:*:*
  • OR cpe:/o:microsoft:windows:2003_server:sp1:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows:2003_server:sp1_itanium:*:*:*:*:*:*
  • OR cpe:/a:microsoft:windows_2003:*:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.mitre.oval:def:1201
    V
    Buffer Overflow in CDOEX Message Processing
    2014-09-29
    oval:org.mitre.oval:def:581
    V
    Buffer Overflow in CDOSYS Message Processing (Server 2003,SP1)
    2011-05-16
    oval:org.mitre.oval:def:1406
    V
    Buffer Overflow in CDOSYS Message Processing (WinXP,SP1)
    2011-05-16
    oval:org.mitre.oval:def:848
    V
    Buffer Overflow in CDOSYS Message Processing (64-bit WinXP,SP1)
    2011-05-16
    oval:org.mitre.oval:def:1420
    V
    Buffer Overflow in CDOSYS Message Processing (Win2K,SP4)
    2011-05-16
    oval:org.mitre.oval:def:1130
    V
    Buffer Overflow in CDOSYS Message Processing (Server 2003)
    2011-05-16
    oval:org.mitre.oval:def:1515
    V
    Buffer Overflow in CDOSYS Message Processing (WinXP,SP2)
    2011-05-16
    BACK
    microsoft exchange server 2000 sp3
    microsoft windows 2000 - sp4
    microsoft windows server 2003 -
    microsoft windows server 2003 -
    microsoft windows server 2003 r2
    microsoft windows server 2003 sp1
    microsoft windows server 2003 sp1
    microsoft windows xp -
    microsoft windows xp - sp1
    microsoft windows xp - sp2
    microsoft windows xp - sp1
    microsoft windows 2000 - sp4
    microsoft windows 2003_server
    microsoft windows xp sp2
    microsoft exchange server 2000 sp3
    microsoft windows 2003 server -
    microsoft windows 2003_server sp1
    microsoft windows 2003_server sp1_itanium
    microsoft windows 2003 *