Vulnerabilities > CVE-2000-0260 - Unspecified vulnerability in Microsoft Frontpage and Visual Interdev

047910
CVSS 7.5 - HIGH
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
PARTIAL
Availability impact
PARTIAL
network
low complexity
microsoft
nessus
exploit available

Summary

Buffer overflow in the dvwssr.dll DLL in Microsoft Visual Interdev 1.0 allows users to cause a denial of service or execute commands, aka the "Link View Server-Side Component" vulnerability.

Vulnerable Configurations

Part Description Count
Application
Microsoft
2

Exploit-Db

  • descriptionMS FrontPage 98 Server Extensions for IIS,MS InterDev 1.0 Filename Obfuscation. CVE-2000-0260. Remote exploit for windows platform
    idEDB-ID:19845
    last seen2016-02-02
    modified2000-04-14
    published2000-04-14
    reporterrain forest puppy
    sourcehttps://www.exploit-db.com/download/19845/
    titleMicrosoft FrontPage 98 Server Extensions for IIS,Microsoft InterDev 1.0 Filename Obfuscation
  • descriptionMS FrontPage 98 Server Extensions for IIS,MS InterDev 1.0 Buffer Overflow Vulnerability. CVE-2000-0260. Remote exploit for windows platform
    idEDB-ID:19846
    last seen2016-02-02
    modified2000-04-14
    published2000-04-14
    reporterRichie & Beto
    sourcehttps://www.exploit-db.com/download/19846/
    titleMicrosoft FrontPage 98 Server Extensions for IIS,Microsoft InterDev 1.0 - Buffer Overflow Vulnerability

Nessus

NASL familyWeb Servers
NASL idFRONTPAGE_DVWSSR.NASL
descriptionThe version of Microsoft FrontPage running on the remote host has the following vulnerabilities in
last seen2020-06-01
modified2020-06-02
plugin id10369
published2000-04-14
reporterThis script is Copyright (C) 2000-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/10369
titleMicrosoft FrontPage dvwssr.dll Multiple Vulnerabilities
code
#
# (C) Tenable Network Security, Inc.
#

include("compat.inc");


if(description)
{
 script_id(10369);
 script_version ("1.59");
 script_cve_id("CVE-2000-0260");
 script_bugtraq_id(1109);
 script_xref(name:"MSFT", value:"MS00-025");

 script_name(english:"Microsoft FrontPage dvwssr.dll Multiple Vulnerabilities");
 script_summary(english:"Checks for the presence of  /_vti_bin/_vti_aut/dvwssr.dll");
 
 script_set_attribute(
   attribute:"synopsis",
   value:"The remote web server has multiple vulnerabilities."
 );
 script_set_attribute( attribute:"description",  value:
"The version of Microsoft FrontPage running on the remote host has
the following vulnerabilities in '/_vti_bin/_vti_aut/dvwssr.dll' :

  - A security bypass vulnerability that allows anyone with
    web authoring permissions to alter other users' files.

  - A remote buffer overflow vulnerability that could allow
    a remote attacker to crash the server, or possibly
    execute arbitrary code." );
 # https://web.archive.org/web/20031207215454/www.wiretrip.net/rfp/txt/rfp2k02.txt
 script_set_attribute(
   attribute:"see_also",
   value:"http://www.nessus.org/u?3772b65c"
 );
 script_set_attribute(
   attribute:"see_also",
   value:"https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2000/ms00-025"
 );
 script_set_attribute(attribute:"solution", value:
"Delete all copies of dvwssr.dll from the server.  Refer to the
Microsoft Security Bulletin for further information." );
 script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
 script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
 script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
 script_set_attribute(attribute:"exploit_available", value:"true");
 script_set_attribute(attribute:"plugin_publication_date", value: "2000/04/14");
 script_set_attribute(attribute:"vuln_publication_date", value: "2000/04/14");
 script_cvs_date("Date: 2018/11/15 20:50:25");

 script_set_attribute(attribute:"plugin_type", value:"remote");
 script_end_attributes();

 script_category(ACT_GATHER_INFO);
 script_family(english:"Web Servers");

 script_copyright(english:"This script is Copyright (C) 2000-2018 Tenable Network Security, Inc.");
 script_dependencie("find_service1.nasl", "http_version.nasl", "www_fingerprinting_hmap.nasl");
 script_require_ports("Services/www", 80);

 exit(0);
}

#
# The script code starts here
#

include("global_settings.inc");
include("misc_func.inc");
include("http.inc");

port = get_http_port(default:80);

banner = get_http_banner(port:port);
if ( ! banner ) exit(0);
if ( ! egrep(pattern:"^Server: .*IIS/[34]", string:banner ) ) exit(0);

w = http_send_recv3(method:"GET", item:"/", port:port);
if (ereg(pattern:"^HTTP/1\.. 40[14] ", string:w[0]))exit(0);

if (!ereg(pattern:"^HTTP/1\.. ", string:w[0]))exit(0);
  
w = http_send_recv3(method:"GET", item:"/_vti_bin/_vti_aut/dvwssr.dll", port:port);
code = w[0];
r = strcat(w[1], '\r\n', w[2]);

  #
  # IIS will return a 500 error for an unknown file,
  # and a 401 error when the file is present.
  #
  # According to https://web.archive.org/web/20000510063805/http://archives.neohapsis.com/archives/win2ksecadvice/2000-q2/0015.html
  # Example 3: 
  # $ nc -v -w2 target.system 80 
  # GET /_vti_bin/_vti_aut/dvwssr.dll HTTP/1.0 (hit enter twice) 
  # Connection closed by foreign host. 
  #
  # The connection closed means that you had the rights to run the DLL, but 
  # since no parameters were passed the connection was completed. 
  
  if("WWW-Authenticate:" >< r)exit(0);
  
  is200 = ereg(pattern:"^HTTP/[0-9]\.[0-9] 200 ", string:code);

  if(("HTTP/1.1 401 Access Denied" >< code) ||
      (strlen(r) == 0)  || is200 )  
  {
  if ( is200  && strlen(r))
   {
    no404 = tolower(get_kb_item(string("www/no404/",  port)));
    if(no404)
    {
     if(no404 >< tolower(r))exit(0);
    }
   }
   security_hole(port);
  }