CVE-2001-1319

Microsoft Exchange 5.5 2000 allows remote attackers to cause a denial of service (hang) via exceptional BER encodings for the LDAP filter type field, as demonstrated by the PROTOS LDAPv3 test suite.
References
Link Resource
http://ciac.llnl.gov/ciac/bulletins/l-116.shtml Patch Third Party Advisory US Government Resource Vendor Advisory
http://www.cert.org/advisories/CA-2001-18.html Third Party Advisory US Government Resource
http://www.ee.oulu.fi/research/ouspg/protos/testing/c06/ldapv3/ Third Party Advisory
http://www.kb.cert.org/vuls/id/763400 Third Party Advisory US Government Resource
http://www.kb.cert.org/vuls/id/CFCN-4YAQC7 Third Party Advisory US Government Resource
http://www.securityfocus.com/bid/3045 Third Party Advisory VDB Entry
https://exchange.xforce.ibmcloud.com/vulnerabilities/6899 Third Party Advisory VDB Entry
http://ciac.llnl.gov/ciac/bulletins/l-116.shtml Patch Third Party Advisory US Government Resource Vendor Advisory
http://www.cert.org/advisories/CA-2001-18.html Third Party Advisory US Government Resource
http://www.ee.oulu.fi/research/ouspg/protos/testing/c06/ldapv3/ Third Party Advisory
http://www.kb.cert.org/vuls/id/763400 Third Party Advisory US Government Resource
http://www.kb.cert.org/vuls/id/CFCN-4YAQC7 Third Party Advisory US Government Resource
http://www.securityfocus.com/bid/3045 Third Party Advisory VDB Entry
https://exchange.xforce.ibmcloud.com/vulnerabilities/6899 Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:microsoft:exchange_server:5.5:-:*:*:*:*:*:*
cpe:2.3:a:microsoft:exchange_server:2000:-:*:*:*:*:*:*

History

20 Nov 2024, 23:37

Type Values Removed Values Added
References () http://ciac.llnl.gov/ciac/bulletins/l-116.shtml - Patch, Third Party Advisory, US Government Resource, Vendor Advisory () http://ciac.llnl.gov/ciac/bulletins/l-116.shtml - Patch, Third Party Advisory, US Government Resource, Vendor Advisory
References () http://www.cert.org/advisories/CA-2001-18.html - Third Party Advisory, US Government Resource () http://www.cert.org/advisories/CA-2001-18.html - Third Party Advisory, US Government Resource
References () http://www.ee.oulu.fi/research/ouspg/protos/testing/c06/ldapv3/ - Third Party Advisory () http://www.ee.oulu.fi/research/ouspg/protos/testing/c06/ldapv3/ - Third Party Advisory
References () http://www.kb.cert.org/vuls/id/763400 - Third Party Advisory, US Government Resource () http://www.kb.cert.org/vuls/id/763400 - Third Party Advisory, US Government Resource
References () http://www.kb.cert.org/vuls/id/CFCN-4YAQC7 - Third Party Advisory, US Government Resource () http://www.kb.cert.org/vuls/id/CFCN-4YAQC7 - Third Party Advisory, US Government Resource
References () http://www.securityfocus.com/bid/3045 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/3045 - Third Party Advisory, VDB Entry
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/6899 - Third Party Advisory, VDB Entry () https://exchange.xforce.ibmcloud.com/vulnerabilities/6899 - Third Party Advisory, VDB Entry

Information

Published : 2001-07-16 04:00

Updated : 2024-11-20 23:37


NVD link : CVE-2001-1319

Mitre link : CVE-2001-1319

CVE.ORG link : CVE-2001-1319


JSON object : View

Products Affected

microsoft

  • exchange_server