{"containers":{"cna":{"title":"Microsoft Outlook Denial of Service Vulnerability","datePublic":"2020-10-13T07:00:00.000Z","affected":[{"vendor":"Microsoft","product":"Microsoft Office 2019","cpes":["cpe:2.3:a:microsoft:office:2019:*:*:*:*:*:*:*"],"platforms":["32-bit Systems","x64-based Systems"],"versions":[{"version":"19.0.0","lessThan":"https://aka.ms/OfficeSecurityReleases","versionType":"custom","status":"affected"}]},{"vendor":"Microsoft","product":"Microsoft 365 Apps for Enterprise","cpes":["cpe:2.3:a:microsoft:365_apps:-:*:*:*:enterprise:*:*:*"],"platforms":["32-bit Systems","x64-based Systems"],"versions":[{"version":"16.0.1","lessThan":"https://aka.ms/OfficeSecurityReleases","versionType":"custom","status":"affected"}]},{"vendor":"Microsoft","product":"Microsoft Outlook 2016","cpes":["cpe:2.3:a:microsoft:outlook:2016:*:*:*:*:x86:*:*","cpe:2.3:a:microsoft:outlook:2016:*:*:*:*:x64:*:*"],"platforms":["32-bit Systems","x64-based Systems"],"versions":[{"version":"16.0.0.0","lessThan":"publication","versionType":"custom","status":"affected"}]},{"vendor":"Microsoft","product":"Microsoft Outlook 2013 Service Pack 1","cpes":["cpe:2.3:a:microsoft:outlook:2013:*:*:*:*:x86:*:*","cpe:2.3:a:microsoft:outlook:2013:*:*:*:*:*:x64:*","cpe:2.3:a:microsoft:outlook:2013:*:*:*:rt:*:*:*"],"platforms":["32-bit Systems","x64-based Systems","ARM64-based Systems"],"versions":[{"version":"15.0.0.0","lessThan":"publication","versionType":"custom","status":"affected"}]},{"vendor":"Microsoft","product":"Microsoft Outlook 2010 Service Pack 2","cpes":["cpe:2.3:a:microsoft:outlook:2010:sp2:*:*:*:*:*:*"],"platforms":["32-bit Systems","x64-based Systems"],"versions":[{"version":"13.0.0.0","lessThan":"publication","versionType":"custom","status":"affected"}]}],"descriptions":[{"value":"<p>A denial of service vulnerability exists in Microsoft Outlook software when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could cause a remote denial of service against a system.</p>\n<p>Exploitation of the vulnerability requires that a specially crafted email be sent to a vulnerable Outlook server.</p>\n<p>The security update addresses the vulnerability by correcting how Microsoft Outlook handles objects in memory.</p>","lang":"en-US"}],"problemTypes":[{"descriptions":[{"description":"Denial of Service","lang":"en-US","type":"Impact"}]}],"providerMetadata":{"orgId":"f38d906d-7342-40ea-92c1-6c4a2c6478c8","shortName":"microsoft","dateUpdated":"2023-12-31T19:20:20.576Z"},"references":[{"tags":["x_refsource_MISC"],"url":"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-16949"}],"metrics":[{"format":"CVSS","scenarios":[{"lang":"en-US","value":"GENERAL"}],"cvssV3_1":{"version":"3.1","baseSeverity":"MEDIUM","baseScore":4.7,"vectorString":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C"}}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-04T13:45:34.666Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_MISC","x_transferred"],"url":"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-16949"}]}]},"cveMetadata":{"assignerOrgId":"f38d906d-7342-40ea-92c1-6c4a2c6478c8","assignerShortName":"microsoft","cveId":"CVE-2020-16949","datePublished":"2020-10-16T22:18:02.000Z","dateReserved":"2020-08-04T00:00:00.000Z","dateUpdated":"2024-08-04T13:45:34.666Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}