CVE-2005-1987

N/A Unknown
Published: October 13, 2005 Modified: April 16, 2026
View on NVD

Description

Buffer overflow in Collaboration Data Objects (CDO), as used in Microsoft Windows and Microsoft Exchange Server, allows remote attackers to execute arbitrary code when CDOSYS or CDOEX processes an e-mail message with a large header name, as demonstrated using the "Content-Type" string.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://marc.info/?l=bugtraq&m=112915118302012&w=2
Source: secure@microsoft.com
Mailing List Third Party Advisory
http://secunia.com/advisories/17167
Source: secure@microsoft.com
Third Party Advisory
http://securitytracker.com/id?1015038
Source: secure@microsoft.com
Third Party Advisory VDB Entry
http://securitytracker.com/id?1015039
Source: secure@microsoft.com
Third Party Advisory VDB Entry
http://www.kb.cert.org/vuls/id/883460
Source: secure@microsoft.com
Third Party Advisory US Government Resource
http://www.osvdb.org/19905
Source: secure@microsoft.com
Broken Link
http://www.securityfocus.com/bid/15067
Source: secure@microsoft.com
Third Party Advisory VDB Entry
http://www.us-cert.gov/cas/techalerts/TA05-284A.html
Source: secure@microsoft.com
Third Party Advisory US Government Resource
https://exchange.xforce.ibmcloud.com/vulnerabilities/22495
Source: secure@microsoft.com
Third Party Advisory VDB Entry
http://archives.neohapsis.com/archives/fulldisclosure/2005-10/0289.html
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://marc.info/?l=bugtraq&m=112915118302012&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List Third Party Advisory
http://secunia.com/advisories/17167
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://securitytracker.com/id?1015038
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory VDB Entry
http://securitytracker.com/id?1015039
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory VDB Entry
http://www.kb.cert.org/vuls/id/883460
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory US Government Resource
http://www.osvdb.org/19905
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.securityfocus.com/bid/15067
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory VDB Entry
http://www.us-cert.gov/cas/techalerts/TA05-284A.html
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory US Government Resource
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-048
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/22495
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory VDB Entry
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1130
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1201
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1406
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1420
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1515
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A581
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A848
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory

38 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
57.0%
98th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

microsoft