Home    |    View Topics    |    Search    |    Contact Us    |   



Category:   Application (E-mail Server)  >   Microsoft Exchange Vendors:   Microsoft
Microsoft Exchange MAPI Command Literal Processing Bug Lets Remote Users Deny Service
SecurityTracker Alert ID:  1021701
SecurityTracker URL:
CVE Reference:   CVE-2009-0099   (Links to External Site)
Updated:  Feb 17 2009
Original Entry Date:  Feb 10 2009
Impact:   Denial of service via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 2000, 2003, 2007
Description:   A vulnerability was reported in Microsoft Exchange. A remote user can cause denial of service conditions on the target system.

A remote user can send specially crafted MAPI commands to the target application via the Electronic Messaging System Microsoft Data Base 32 bit build (EMSMDB2) provider to cause the application to stop responding.

The Microsoft Exchange System Attendant service is affected. Other services and applications that use the EMSMDB32 provider may be affected.

The Microsoft indicated that the Microsoft Exchange Server MAPI Client is also affected. The Solution section was updated.

Bogdan Materna of VoIPshield Systems reported this vulnerability.

Impact:   A remote user can cause the target application or service to stop responding.
Solution:   The vendor has issued the following fixes:

Microsoft Exchange 2000 Server Service Pack 3 with the Update Rollup of August 2004:

Microsoft Exchange Server 2003 Service Pack 2:

Microsoft Exchange Server 2007 Service Pack 1:

Microsoft Exchange Server MAPI Client and Collaboration Data Objects 1.2.1:

The Microsoft advisory is available at:

On February 17, 2009 (UTC), Microsoft updated their advisory to indicate that the Microsoft Exchange Server MAPI Client is also affected by MS09-003.

Vendor URL: (Links to External Site)
Cause:   Input validation error
Underlying OS:  Windows (2000), Windows (2003), Windows (Vista)

Message History:   None.

 Source Message Contents

[Original Message Not Available for Viewing]

Go to the Top of This SecurityTracker Archive Page

Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, LLC