Buffer overflow in Collaboration Data Objects (CDO), as used in Microsoft Windows and Microsoft Exchange Server, allows remote attackers to execute arbitrary code when CDOSYS or CDOEX processes an e-mail message with a large header name, as demonstrated using the “Content-Type” string.
archives.neohapsis.com/archives/fulldisclosure/2005-10/0289.html
marc.info/?l=bugtraq&m=112915118302012&w=2
secunia.com/advisories/17167
securitytracker.com/id?1015038
securitytracker.com/id?1015039
support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ907245
www.kb.cert.org/vuls/id/883460
www.osvdb.org/19905
www.securityfocus.com/bid/15067
www.us-cert.gov/cas/techalerts/TA05-284A.html
docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-048
exchange.xforce.ibmcloud.com/vulnerabilities/22495
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1130
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1201
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1406
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1420
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1515
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A581
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A848