CVE-2007-0039

N/A Unknown
Published: May 08, 2007 Modified: April 23, 2026
View on NVD

Description

The Exchange Collaboration Data Objects (EXCDO) functionality in Microsoft Exchange Server 2000 SP3, 2003 SP1 and SP2, and 2007 allows remote attackers to cause a denial of service (crash) via an Internet Calendar (iCal) file containing multiple X-MICROSOFT-CDO-MODPROPS (MODPROPS) properties in which the second MODPROPS is longer than the first, which triggers a NULL pointer dereference and an unhandled exception.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://lists.grok.org.uk/pipermail/full-disclosure/2007-May/063232.html
Source: secure@microsoft.com
Mailing List Third Party Advisory
http://secunia.com/advisories/25183
Source: secure@microsoft.com
Third Party Advisory
http://www.osvdb.org/34390
Source: secure@microsoft.com
Broken Link
http://www.securityfocus.com/archive/1/468047/100/0/threaded
Source: secure@microsoft.com
Third Party Advisory VDB Entry
http://www.securityfocus.com/archive/1/468871/100/200/threaded
Source: secure@microsoft.com
Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/23808
Source: secure@microsoft.com
Third Party Advisory VDB Entry
http://www.securitytracker.com/id?1018015
Source: secure@microsoft.com
Third Party Advisory VDB Entry
http://www.us-cert.gov/cas/techalerts/TA07-128A.html
Source: secure@microsoft.com
Third Party Advisory US Government Resource
http://www.vupen.com/english/advisories/2007/1711
Source: secure@microsoft.com
Permissions Required
https://exchange.xforce.ibmcloud.com/vulnerabilities/33888
Source: secure@microsoft.com
Third Party Advisory VDB Entry
http://lists.grok.org.uk/pipermail/full-disclosure/2007-May/063232.html
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List Third Party Advisory
http://secunia.com/advisories/25183
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.osvdb.org/34390
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.securityfocus.com/archive/1/468047/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory VDB Entry
http://www.securityfocus.com/archive/1/468871/100/200/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/23808
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory VDB Entry
http://www.securitytracker.com/id?1018015
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory VDB Entry
http://www.us-cert.gov/cas/techalerts/TA07-128A.html
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory US Government Resource
http://www.vupen.com/english/advisories/2007/1711
Source: af854a3a-2127-422b-91ae-364da2661108
Permissions Required
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-026
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/33888
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory VDB Entry
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1593
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory

26 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
39.6%
97th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

microsoft