CVE-2008-1438
https://notcve.org/view.php?id=CVE-2008-1438
Unspecified vulnerability in Microsoft Malware Protection Engine (mpengine.dll) 1.1.3520.0 and 0.1.13.192, as used in multiple Microsoft products, allows context-dependent attackers to cause a denial of service (disk space exhaustion) via a file with "crafted data structures" that trigger the creation of large temporary files, a different vulnerability than CVE-2008-1437. Vulnerabilidad no especificada en la Máquina de Protección de Malware de Microsoft (mpengine.dll) versiones 1.1.3520.0 y 0.1.13.192, tal y como se usa en múltiples productos de Microsoft, permite a atacantes según contexto provocar una denegación de Servicio (agotamiento de espacio en disco) a través de “estructuras de datos manipuladas” que provocan la creación de ficheros grandes temporales, una vulnerabilidad diferente a la CVE-2008-1438. • http://marc.info/?l=bugtraq&m=121129490723574&w=2 http://secunia.com/advisories/30172 http://www.securityfocus.com/bid/29073 http://www.securitytracker.com/id?1020016 http://www.us-cert.gov/cas/techalerts/TA08-134A.html http://www.vupen.com/english/advisories/2008/1506/references https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-029 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14375 • CWE-399: Resource Management Errors •
CVE-2008-1437
https://notcve.org/view.php?id=CVE-2008-1437
Unspecified vulnerability in Microsoft Malware Protection Engine (mpengine.dll) 1.1.3520.0 and 0.1.13.192, as used in multiple Microsoft products, allows context-dependent attackers to cause a denial of service (engine hang and restart) via a crafted file, a different vulnerability than CVE-2008-1438. Vulnerabilidad no especificada en la Máquina de Protección de Malware de Microsoft (mpengine.dll) versiones 1.1.3520.0 y 0.1.13.192, tal y como se usa en múltiples productos de Microsoft, permite a atacantes según contexto provocar una denegación de servicio (cuelgue del equipo y reinicio) a través de un archivo manipulado, una vulnerabilidad diferente a la CVE-2008-1438. • http://marc.info/?l=bugtraq&m=121129490723574&w=2 http://secunia.com/advisories/30172 http://www.securityfocus.com/bid/29060 http://www.securitytracker.com/id?1020016 http://www.us-cert.gov/cas/techalerts/TA08-134A.html http://www.vupen.com/english/advisories/2008/1506/references https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-029 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13981 • CWE-399: Resource Management Errors •
CVE-2007-0039
https://notcve.org/view.php?id=CVE-2007-0039
The Exchange Collaboration Data Objects (EXCDO) functionality in Microsoft Exchange Server 2000 SP3, 2003 SP1 and SP2, and 2007 allows remote attackers to cause a denial of service (crash) via an Internet Calendar (iCal) file containing multiple X-MICROSOFT-CDO-MODPROPS (MODPROPS) properties in which the second MODPROPS is longer than the first, which triggers a NULL pointer dereference and an unhandled exception. La funcionalidad Exchange Collaboration Data Objects (EXCDO) en Microsoft Exchange Server 2000 SP3, 2003 SP1 y SP2 y 2007, permite a atacantes remotos causar una denegación de servicio (bloqueo) por medio de un archivo Internet Calendar (iCal) que contiene varios propiedades X-MICROSOFT-CDO-MODPROPS (MODPROPS) en las que el segundo MODPROPS es más largo que el primero, lo que desencadena una desreferencia del puntero NULL y una excepción no manejada. • http://lists.grok.org.uk/pipermail/full-disclosure/2007-May/063232.html http://secunia.com/advisories/25183 http://www.determina.com/security.research/vulnerabilities/exchange-ical-modprops.html http://www.osvdb.org/34390 http://www.securityfocus.com/archive/1/468047/100/0/threaded http://www.securityfocus.com/archive/1/468871/100/200/threaded http://www.securityfocus.com/bid/23808 http://www.securitytracker.com/id?1018015 http://www.us-cert.gov/cas/techalerts/TA07-128A.html ht • CWE-476: NULL Pointer Dereference •
CVE-2007-0221
https://notcve.org/view.php?id=CVE-2007-0221
Integer overflow in the IMAP (IMAP4) support in Microsoft Exchange Server 2000 SP3 allows remote attackers to cause a denial of service (service hang) via crafted literals in an IMAP command, aka the "IMAP Literal Processing Vulnerability." Un desbordamiento de enteros en el soporte IMAP (IMAP4) en Microsoft Exchange Server 2000 SP3 permite a los atacantes remotos causar una denegación de servicio (suspensión de servicio) por medio de literales creados en un comando IMAP, también se conoce como la "IMAP Literal Processing Vulnerability". • http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=526 http://secunia.com/advisories/25183 http://www.osvdb.org/34392 http://www.securityfocus.com/archive/1/468871/100/200/threaded http://www.securityfocus.com/bid/23810 http://www.securitytracker.com/id?1018015 http://www.us-cert.gov/cas/techalerts/TA07-128A.html http://www.vupen.com/english/advisories/2007/1711 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-026 https://exchange • CWE-190: Integer Overflow or Wraparound •
CVE-2007-0220
https://notcve.org/view.php?id=CVE-2007-0220
Cross-site scripting (XSS) vulnerability in Outlook Web Access (OWA) in Microsoft Exchange Server 2000 SP3, and 2003 SP1 and SP2 allows remote attackers to execute arbitrary scripts, spoof content, or obtain sensitive information via certain UTF-encoded, script-based e-mail attachments, involving an "incorrectly handled UTF character set label". Vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en Outlook Web Access (OWA) de Microsoft Exchange Server 2000 SP3, y 2003 SP1 y SP2 permite a atacantes remotos ejecutar secuencias de comandos de su elección, falsificar contenido u obtener información sensible mediante ciertas codificaciones UTF, anexos de correo electrónico basados en secuencias de comandos, implicando una "etiqueta de conjunto de caracteres UTF manejada incorrectamente". • http://secunia.com/advisories/25183 http://www.kb.cert.org/vuls/id/124113 http://www.osvdb.org/34389 http://www.securityfocus.com/archive/1/468871/100/200/threaded http://www.securityfocus.com/bid/23806 http://www.securitytracker.com/id?1018015 http://www.us-cert.gov/cas/techalerts/TA07-128A.html http://www.vupen.com/english/advisories/2007/1711 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-026 https://exchange.xforce.ibmcloud.com/vulne • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •