CVE-2006-0027
MS06-019 Exchange MODPROP Heap Overflow
Severity Score
9.8
*CVSS v3
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
1
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
-
*SSVC
Descriptions
Unspecified vulnerability in Microsoft Exchange allows remote attackers to execute arbitrary code via e-mail messages with crafted (1) vCal or (2) iCal Calendar properties.
Microsoft has released updates that address critical vulnerabilities in Microsoft Windows and Exchange Server. Exploitation of these vulnerabilities could allow a remote, unauthenticated attacker to execute arbitrary code or cause a denial of service on a vulnerable system.
*Credits:
N/A
CVSS Scores
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:-
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2005-11-30 CVE Reserved
- 2006-05-09 CVE Published
- 2024-08-07 CVE Updated
- 2024-08-31 First Exploit
- 2025-07-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
CAPEC
References (12)
URL | Tag | Source |
---|---|---|
http://secunia.com/advisories/20029 | Third Party Advisory | |
http://securitytracker.com/id?1016048 | Third Party Advisory | |
http://www.osvdb.org/25338 | Broken Link | |
http://www.securityfocus.com/bid/17908 | Third Party Advisory | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/25556 | Third Party Advisory | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1818 | Signature | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1996 | Signature | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2035 | Signature |
URL | Date | SRC |
---|---|---|
https://packetstorm.news/files/id/180581 | 2024-08-31 |
URL | Date | SRC |
---|---|---|
http://www.kb.cert.org/vuls/id/303452 | 2020-04-09 | |
http://www.us-cert.gov/cas/techalerts/TA06-129A.html | 2020-04-09 | |
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-019 | 2020-04-09 |
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Microsoft Search vendor "Microsoft" | Exchange Server Search vendor "Microsoft" for product "Exchange Server" | 2000 Search vendor "Microsoft" for product "Exchange Server" and version "2000" | sp3 |
Affected
| ||||||
Microsoft Search vendor "Microsoft" | Exchange Server Search vendor "Microsoft" for product "Exchange Server" | 2003 Search vendor "Microsoft" for product "Exchange Server" and version "2003" | sp1 |
Affected
| ||||||
Microsoft Search vendor "Microsoft" | Exchange Server Search vendor "Microsoft" for product "Exchange Server" | 2003 Search vendor "Microsoft" for product "Exchange Server" and version "2003" | sp2 |
Affected
|