CVE-2005-0560

N/A Unknown
Published: May 02, 2005 Modified: April 16, 2026
View on NVD

Description

Heap-based buffer overflow in the SvrAppendReceivedChunk function in xlsasink.dll in the SMTP service of Exchange Server 2000 and 2003 allows remote attackers to execute arbitrary code via a crafted X-LINK2STATE extended verb request to the SMTP port.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://marc.info/?l=bugtraq&m=111393947713420&w=2
Source: secure@microsoft.com
Mailing List Third Party Advisory
http://secunia.com/advisories/14920/
Source: secure@microsoft.com
Patch Third Party Advisory
http://www.kb.cert.org/vuls/id/275193
Source: secure@microsoft.com
Patch Third Party Advisory US Government Resource
http://www.osvdb.org/displayvuln.php?osvdb_id=15467
Source: secure@microsoft.com
Broken Link
http://www.us-cert.gov/cas/techalerts/TA05-102A.html
Source: secure@microsoft.com
Patch Third Party Advisory US Government Resource
http://xforce.iss.net/xforce/alerts/id/193
Source: secure@microsoft.com
Broken Link
http://marc.info/?l=bugtraq&m=111393947713420&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List Third Party Advisory
http://secunia.com/advisories/14920/
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Third Party Advisory
http://www.kb.cert.org/vuls/id/275193
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Third Party Advisory US Government Resource
http://www.osvdb.org/displayvuln.php?osvdb_id=15467
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.us-cert.gov/cas/techalerts/TA05-102A.html
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Third Party Advisory US Government Resource
http://xforce.iss.net/xforce/alerts/id/193
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-021
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Vendor Advisory
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4032
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory

16 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
72.9%
99th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

microsoft