CVE-2005-0556
CVSSN/A
发布时间 :2005-02-26 00:00:00
修订时间 :2005-02-26 00:00:00
MO    

[原文]** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.


[CNNVD]CNNVD数据暂缺。


[机译]**储备**候选人由一个组织或个人将使用它宣布了新的安全问题时,已预留。

- CVSS (基础分值)

CVSS暂不可用

- CPE (受影响的平台与产品)

产品及版本信息(CPE)暂不可用

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0556
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2005-0556
(官方数据源) NVD

- 其它链接及资源

- 漏洞信息

22305
Microsoft Outlook/Exchange TNEF Decoding Arbitrary Code Execution
Input Manipulation
Loss of Integrity Patch / RCS
Vendor Verified

- 漏洞描述

Microsoft Outlook and Exchange contain a flaw that may allow arbitrary code execution. The issue is due to the servers not properly sanitizing input via e-mail messages. By sending an e-mail with a crafted Transport Neutral Encapsulation Format (TNEF) MIME attachment, a user who views (opens or previews) the e-mail will execute custom code sent by an attacker.

- 时间线

2006-01-11 Unknow
Unknow Unknow

- 解决方案

Currently, there are no known workarounds or upgrades to correct this issue. However, Microsoft has released a patch to address this vulnerability.

- 相关参考

- 漏洞作者

Unknown or Incomplete
 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站