Skip to main content

CVE-1999-1164: Microsoft Outlook client allows remote attackers to cause a denial of service by sending multiple em

Medium
VulnerabilityCVE-1999-1164cve-1999-1164denial of service
Published: Fri Jun 25 1999 (06/25/1999, 04:00:00 UTC)
Source: NVD
Vendor/Project: microsoft
Product: outlook

Description

Microsoft Outlook client allows remote attackers to cause a denial of service by sending multiple email messages with the same X-UIDL headers, which causes Outlook to hang.

AI-Powered Analysis

AILast updated: 07/01/2025, 16:58:00 UTC

Technical Analysis

CVE-1999-1164 is a vulnerability affecting Microsoft Outlook versions 97, 98, and 2000. The issue arises when a remote attacker sends multiple email messages containing identical X-UIDL headers to the targeted Outlook client. The X-UIDL header is used by email clients to uniquely identify messages on the server. When Outlook receives multiple emails with the same X-UIDL, it causes the client to hang, resulting in a denial of service (DoS) condition. This vulnerability does not compromise confidentiality or integrity but impacts availability by rendering the Outlook client unresponsive. The attack vector is network-based (remote), requires no authentication, and can be executed by simply sending crafted emails to the victim's mailbox. The CVSS score of 5.0 (medium severity) reflects the moderate impact and ease of exploitation without authentication. No patches or fixes are available due to the age of the affected software, and no known exploits have been reported in the wild. Given the affected versions are legacy and largely obsolete, the threat is primarily relevant in environments still running these outdated Outlook clients.

Potential Impact

For European organizations, the impact of this vulnerability is limited but still relevant in legacy environments. Organizations that continue to use Microsoft Outlook 97, 98, or 2000—often in isolated or legacy systems—may experience service disruption if targeted by this attack. The denial of service could interrupt email communications, affecting business operations and productivity. While modern Outlook versions are not affected, some sectors with legacy dependencies, such as government agencies, financial institutions, or industrial control systems, might still run these older clients. The attack does not lead to data breaches or malware installation but could be used as a nuisance or to disrupt critical communications. Due to the lack of patches, mitigation relies on operational controls rather than software fixes.

Mitigation Recommendations

1. Upgrade Outlook clients to supported, modern versions that are not vulnerable to this issue. 2. Implement email filtering at the gateway level to detect and block emails with duplicate or suspicious X-UIDL headers. 3. Employ network-level protections such as intrusion detection/prevention systems (IDS/IPS) to identify and block anomalous email traffic patterns. 4. Isolate legacy systems running vulnerable Outlook versions from the internet or untrusted networks to reduce exposure. 5. Educate users and administrators about the risks of using outdated software and encourage migration to supported platforms. 6. Regularly monitor email server logs for unusual patterns that may indicate attempts to exploit this vulnerability.

Need more detailed analysis?Get Pro

Threat ID: 682ca32cb6fd31d6ed7df09d

Added to database: 5/20/2025, 3:43:40 PM

Last enriched: 7/1/2025, 4:58:00 PM

Last updated: 7/25/2025, 10:27:01 PM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats