First published: Wed May 12 2010(Updated: )
Integer overflow in inetcomm.dll in Microsoft Outlook Express 5.5 SP2, 6, and 6 SP1; Windows Live Mail on Windows XP SP2 and SP3, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7; and Windows Mail on Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7 allows remote e-mail servers and man-in-the-middle attackers to execute arbitrary code via a crafted (1) POP3 or (2) IMAP response, as demonstrated by a certain +OK response on TCP port 110, aka "Outlook Express and Windows Mail Integer Overflow Vulnerability."
Credit: secure@microsoft.com secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Any of | ||
Microsoft Outlook Express | =5.5-sp2 | |
Microsoft Outlook Express | =6.0-sp1 | |
Microsoft Windows 2000 | =sp4 | |
All of | ||
Any of | ||
Microsoft Outlook Express | =6.0 | |
Microsoft Windows Live Mail | ||
Any of | ||
Microsoft Windows XP | =sp2 | |
Microsoft Windows XP | =sp3 | |
All of | ||
Any of | ||
Microsoft Outlook Express | =6.0 | |
Microsoft Windows Live Mail | ||
Microsoft Windows XP | =sp2 | |
All of | ||
Microsoft Outlook Express | =6.0 | |
Any of | ||
Microsoft Windows 2003 Server | =sp2 | |
Microsoft Windows 2003 Server | =sp2 | |
Microsoft Windows Server 2003 | =sp2 | |
All of | ||
Any of | ||
Microsoft Windows Live Mail | ||
Microsoft Windows Mail | ||
Any of | ||
Microsoft Windows Server 2008 Itanium | ||
Microsoft Windows Server 2008 Itanium | ||
Microsoft Windows Server 2008 Itanium | ||
Microsoft Windows Server 2008 Itanium | =sp2 | |
Microsoft Windows Server 2008 Itanium | =sp2 | |
Microsoft Windows Server 2008 Itanium | ||
Microsoft Windows Server 2008 Itanium | ||
Microsoft Windows Server 2008 Itanium | =gold | |
Microsoft Windows Server 2008 Itanium | =sp2 | |
Microsoft Windows Server 2008 Itanium | =sp2 | |
Microsoft Windows Vista | =sp1 | |
Microsoft Windows Vista | =sp2 | |
Microsoft Windows Vista | =sp1 | |
Microsoft Windows Vista | =sp2 | |
All of | ||
Any of | ||
Microsoft Windows Live Mail | ||
Microsoft Windows Mail | ||
Any of | ||
Microsoft Windows 7 | ||
Microsoft Windows Server 2008 Itanium | =r2 | |
Microsoft Windows Server 2008 Itanium | =r2 | |
Microsoft Outlook Express | =5.5-sp2 | |
Microsoft Outlook Express | =6.0-sp1 | |
Microsoft Windows 2000 | =sp4 | |
Microsoft Outlook Express | =6.0 | |
Microsoft Windows Live Mail | ||
Microsoft Windows XP | =sp2 | |
Microsoft Windows XP | =sp3 | |
Microsoft Windows XP | =sp2 | |
Microsoft Windows 2003 Server | =sp2 | |
Microsoft Windows 2003 Server | =sp2 | |
Microsoft Windows Server 2003 | =sp2 | |
Microsoft Windows Mail | ||
Microsoft Windows Server 2008 Itanium | ||
Microsoft Windows Server 2008 Itanium | ||
Microsoft Windows Server 2008 Itanium | ||
Microsoft Windows Server 2008 Itanium | =sp2 | |
Microsoft Windows Server 2008 Itanium | =sp2 | |
Microsoft Windows Server 2008 Itanium | ||
Microsoft Windows Server 2008 Itanium | ||
Microsoft Windows Server 2008 Itanium | =gold | |
Microsoft Windows Server 2008 Itanium | =sp2 | |
Microsoft Windows Server 2008 Itanium | =sp2 | |
Microsoft Windows Vista | =sp1 | |
Microsoft Windows Vista | =sp1 | |
Microsoft Windows Vista | =sp2 | |
Microsoft Windows Vista | =sp2 | |
Microsoft Windows Vista | =sp1 | |
Microsoft Windows Vista | =sp2 | |
Microsoft Windows 7 | ||
Microsoft Windows Server 2008 Itanium | =r2 | |
Microsoft Windows Server 2008 Itanium | =r2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-0816 has been classified as a critical vulnerability due to its potential to allow remote code execution.
To fix CVE-2010-0816, users should apply the latest security updates provided by Microsoft for affected software.
CVE-2010-0816 affects Microsoft Outlook Express 5.5, 6, Windows Live Mail, and Windows Mail on various Windows operating systems.
Yes, CVE-2010-0816 can be exploited remotely if users open a specially crafted email.
Exploitation of CVE-2010-0816 can lead to arbitrary code execution, compromising the security of the affected systems.