Vulnerabilities > CVE-1999-0449 - Unspecified vulnerability in Microsoft Internet Information Server 4.0
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
NONE Integrity impact
NONE Availability impact
COMPLETE Summary
The ExAir sample site in IIS 4 allows remote attackers to cause a denial of service (CPU consumption) via a direct request to the (1) advsearch.asp, (2) query.asp, or (3) search.asp scripts.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 |
Nessus
NASL family CGI abuses NASL id EXAIR_DOS_ADVSEARCH.NASL description The remote instance of IIS includes the sample site last seen 2020-06-01 modified 2020-06-02 plugin id 10002 published 1999-06-22 reporter This script is Copyright (C) 1999-2018 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/10002 title Microsoft IIS advsearch.asp Direct Request Remote DoS code # # (C) Tenable Network Security, Inc. # include("compat.inc"); if (description) { script_id(10002); script_version("1.45"); script_cvs_date("Date: 2018/11/15 20:50:16"); script_cve_id("CVE-1999-0449"); script_bugtraq_id(193); script_name(english:"Microsoft IIS advsearch.asp Direct Request Remote DoS"); script_summary(english:"Determines the presence of an ExAir ASP"); script_set_attribute(attribute:"synopsis", value:"The remote web server is prone to a denial of service attack."); script_set_attribute(attribute:"description", value: "The remote instance of IIS includes the sample site 'ExAir'. By calling one of the included Active Server Pages, specifically '/iissamples/exair/search/advsearch.asp', an unauthenticated, remote attacker may be cause the web server to hang for up to 90 seconds (the default script timeout) if the default ExAir page and associated DLLs have not been loaded into the IIS memory space. This can be used to render the site unusable."); script_set_attribute(attribute:"see_also", value:"https://seclists.org/bugtraq/1999/Jan/319"); script_set_attribute(attribute:"solution", value:"Delete the 'ExAir' sample IIS site."); script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:P"); script_set_cvss_temporal_vector("CVSS2#E:U/RL:U/RC:ND"); script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available"); script_set_attribute(attribute:"exploit_available", value:"false"); script_set_attribute(attribute:"vuln_publication_date", value:"1999/01/26"); script_set_attribute(attribute:"plugin_publication_date", value:"1999/06/22"); script_set_attribute(attribute:"potential_vulnerability", value:"true"); script_set_attribute(attribute:"plugin_type", value:"remote"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 1999-2018 Tenable Network Security, Inc."); script_family(english:"CGI abuses"); script_dependencie("find_service1.nasl", "http_version.nasl"); script_require_keys("Settings/ParanoidReport", "www/ASP"); script_require_ports("Services/www", 80); exit(0); } include("audit.inc"); include("global_settings.inc"); include("misc_func.inc"); include("http.inc"); if (report_paranoia < 2) audit(AUDIT_PARANOID); port = get_http_port(default:80); if ( ! can_host_asp(port:port) ) exit(0); cgi = "/iissamples/exair/search/advsearch.asp"; ok = is_cgi_installed3(item:cgi, port:port); if(ok)security_warning(port);
NASL family CGI abuses NASL id EXAIR_DOS_QUERY.NASL description The remote instance of IIS includes the sample site last seen 2020-06-01 modified 2020-06-02 plugin id 10003 published 1999-06-22 reporter This script is Copyright (C) 1999-2018 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/10003 title Microsoft IIS query.asp Direct Request Remote DoS NASL family CGI abuses NASL id EXAIR_DOS_SEARCH.NASL description The remote instance of IIS includes the sample site last seen 2020-06-01 modified 2020-06-02 plugin id 10004 published 1999-06-22 reporter This script is Copyright (C) 1999-2018 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/10004 title Microsoft IIS search.asp Direct Request DoS