CERTA-2003-AVI-050
Vulnerability from certfr_avis
Une vulnérabilité dans un des composants du serveur Internet Microsoft IIS 5.0 permet à un utilisateur mal intentionné d'exécuter du code arbitraire à distance.
Description
Le serveur Microsoft IIS 5.0 est fourni avec Windows 2000 par défaut. Il inclut le support du protocole WebDAV (Web Distributed Authoring and Versioning) qui permet la manipulation des fichiers du serveur IIS à distance. Un débordement de tampon dans la bibliothèque ntdll.dll permet à un utilisteur mal intentionné, via une requête malicieusement construite, d'exécuter du code arbitraire à distance.
Contournement provisoire
Voir article Microsoft 816930 :
http://support.microsoft.com/default.aspx?scid=kb;EN-US;816930
Solution
Appliquer le correctif disponible sur le site de Microsoft :
http://microsoft.com/downloads/details.aspx?FamilyId=C9A38D45-5145-4844-B62E-C69D32AC929B&displaylang=fr
Microsoft IIS version 5.0 sous Windows 2000 avec Service Pack 3 et antérieurs.
Impacted products
| Vendor | Product | Description |
|---|
References
| Title | Publication Time | Tags | ||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cp\u003eMicrosoft IIS version 5.0 sous Windows 2000 avec Service Pack 3 et ant\u00e9rieurs.\u003c/p\u003e",
"content": "## Description\n\nLe serveur Microsoft IIS 5.0 est fourni avec Windows 2000 par d\u00e9faut. Il\ninclut le support du protocole WebDAV (Web Distributed Authoring and\nVersioning) qui permet la manipulation des fichiers du serveur IIS \u00e0\ndistance. Un d\u00e9bordement de tampon dans la biblioth\u00e8que ntdll.dll permet\n\u00e0 un utilisteur mal intentionn\u00e9, via une requ\u00eate malicieusement\nconstruite, d\u0027ex\u00e9cuter du code arbitraire \u00e0 distance.\n\n## Contournement provisoire\n\nVoir article Microsoft 816930 :\n\n http://support.microsoft.com/default.aspx?scid=kb;EN-US;816930\n\n## Solution\n\nAppliquer le correctif disponible sur le site de Microsoft :\n\n http://microsoft.com/downloads/details.aspx?FamilyId=C9A38D45-5145-4844-B62E-C69D32AC929B\u0026displaylang=fr\n",
"cves": [],
"initial_release_date": "2003-03-18T00:00:00",
"last_revision_date": "2003-03-18T00:00:00",
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft MS03-007 :",
"url": "http://www.microsoft.com/technet/security/bulletin/ms03-007.asp"
},
{
"title": "Alerte de s\u00e9curit\u00e9 ISS X-Force :",
"url": "http://www.iss.net/issEn/delivery/xforce/alertdetail.jsp?oid=22029"
},
{
"title": "Article Microsoft 816930 :",
"url": "http://support.microsoft.com/default.aspx?scid=kb;en-us;816930"
},
{
"title": "Avis de s\u00e9curit\u00e9 du CERT/CC CA-2003-09 :",
"url": "http://www.cert.org/advisories/CA-2003-09.html"
},
{
"title": "Article Microsoft 815021 :",
"url": "http://support.microsoft.com/default.aspx?scid=kb;en-us;815021"
}
],
"reference": "CERTA-2003-AVI-050",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2003-03-18T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 dans un des composants du serveur Internet Microsoft\nIIS 5.0 permet \u00e0 un utilisateur mal intentionn\u00e9 d\u0027ex\u00e9cuter du code\narbitraire \u00e0 distance.\n",
"title": "Vuln\u00e9rabilit\u00e9 de Microsoft IIS 5.0",
"vendor_advisories": [
{
"published_at": null,
"title": "Avis CA-2003-09 du CERT/CC",
"url": null
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…