Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-1999-1164: Microsoft Outlook client allows remote attackers to cause a denial of service by sending multiple em

0
Medium
VulnerabilityCVE-1999-1164cve-1999-1164denial of service
Published: Fri Jun 25 1999 (06/25/1999, 04:00:00 UTC)
Source: NVD
Vendor/Project: microsoft
Product: outlook

Description

Microsoft Outlook client allows remote attackers to cause a denial of service by sending multiple email messages with the same X-UIDL headers, which causes Outlook to hang.

AI-Powered Analysis

AILast updated: 07/01/2025, 16:58:00 UTC

Technical Analysis

CVE-1999-1164 is a vulnerability affecting Microsoft Outlook versions 97, 98, and 2000. The issue arises when a remote attacker sends multiple email messages containing identical X-UIDL headers to the targeted Outlook client. The X-UIDL header is used by email clients to uniquely identify messages on the server. When Outlook receives multiple emails with the same X-UIDL, it causes the client to hang, resulting in a denial of service (DoS) condition. This vulnerability does not compromise confidentiality or integrity but impacts availability by rendering the Outlook client unresponsive. The attack vector is network-based (remote), requires no authentication, and can be executed by simply sending crafted emails to the victim's mailbox. The CVSS score of 5.0 (medium severity) reflects the moderate impact and ease of exploitation without authentication. No patches or fixes are available due to the age of the affected software, and no known exploits have been reported in the wild. Given the affected versions are legacy and largely obsolete, the threat is primarily relevant in environments still running these outdated Outlook clients.

Potential Impact

For European organizations, the impact of this vulnerability is limited but still relevant in legacy environments. Organizations that continue to use Microsoft Outlook 97, 98, or 2000—often in isolated or legacy systems—may experience service disruption if targeted by this attack. The denial of service could interrupt email communications, affecting business operations and productivity. While modern Outlook versions are not affected, some sectors with legacy dependencies, such as government agencies, financial institutions, or industrial control systems, might still run these older clients. The attack does not lead to data breaches or malware installation but could be used as a nuisance or to disrupt critical communications. Due to the lack of patches, mitigation relies on operational controls rather than software fixes.

Mitigation Recommendations

1. Upgrade Outlook clients to supported, modern versions that are not vulnerable to this issue. 2. Implement email filtering at the gateway level to detect and block emails with duplicate or suspicious X-UIDL headers. 3. Employ network-level protections such as intrusion detection/prevention systems (IDS/IPS) to identify and block anomalous email traffic patterns. 4. Isolate legacy systems running vulnerable Outlook versions from the internet or untrusted networks to reduce exposure. 5. Educate users and administrators about the risks of using outdated software and encourage migration to supported platforms. 6. Regularly monitor email server logs for unusual patterns that may indicate attempts to exploit this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Threat ID: 682ca32cb6fd31d6ed7df09d

Added to database: 5/20/2025, 3:43:40 PM

Last enriched: 7/1/2025, 4:58:00 PM

Last updated: 2/7/2026, 9:33:20 AM

Views: 33

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats