Vulnerabilities > CVE-2001-0244 - Buffer Overflow vulnerability in Microsoft Index Server 2.0

047910
CVSS 7.5 - HIGH
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
PARTIAL
Availability impact
PARTIAL
network
low complexity
microsoft
nessus

Summary

Buffer overflow in Microsoft Index Server 2.0 allows remote attackers to execute arbitrary commands via a long search parameter.

Vulnerable Configurations

Part Description Count
Application
Microsoft
1

Nessus

NASL familyWindows : Microsoft Bulletins
NASL idSMB_NT_MS01-025.NASL
descriptionThe hotfix for the
last seen2020-06-01
modified2020-06-02
plugin id10668
published2001-05-13
reporterThis script is Copyright (C) 2001-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/10668
titleMS01-025: Index Server Multiple Vulnerabilities (294472 / 296185)
code
#
# (C) Tenable Network Security, Inc.
#

include("compat.inc");

if (description)
{
 script_id(10668);
 script_version("1.51");
 script_cvs_date("Date: 2018/11/15 20:50:29");

 script_cve_id("CVE-2001-0244", "CVE-2001-0245");
 script_bugtraq_id(2709);
 script_xref(name:"MSFT", value:"MS01-025");
 script_xref(name:"CERT", value:"655248");
 script_xref(name:"MSKB", value:"294472");
 script_xref(name:"MSKB", value:"296185");

 script_name(english:"MS01-025: Index Server Multiple Vulnerabilities (294472 / 296185)");
 script_summary(english:"Determines whether the hotfixes Q294472 and Q296185 are installed");

 script_set_attribute(attribute:"synopsis", value:"Arbitrary code can be executed on the remote host.");
 script_set_attribute(attribute:"description", value:
"The hotfix for the 'Malformed request to index server' problem has not
been applied.

This vulnerability can allow an attacker to execute arbitrary code on
the remote host.");
 script_set_attribute(attribute:"see_also", value:"https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2001/ms01-025");
 script_set_attribute(attribute:"solution", value:
"Microsoft has released a set of patches for Index Server 2.0 and
Windows 2000.");
 script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
 script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
 script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H");
 script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
 script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
 script_set_attribute(attribute:"exploit_available", value:"false");

 script_set_attribute(attribute:"vuln_publication_date", value:"2001/05/10");
 script_set_attribute(attribute:"patch_publication_date", value:"2001/05/10");
 script_set_attribute(attribute:"plugin_publication_date", value:"2001/05/13");

 script_set_attribute(attribute:"plugin_type", value:"local");
 script_set_attribute(attribute:"cpe", value:"cpe:/o:microsoft:windows");
 script_end_attributes();

 script_category(ACT_GATHER_INFO);
 script_copyright(english:"This script is Copyright (C) 2001-2018 Tenable Network Security, Inc.");
 script_family(english:"Windows : Microsoft Bulletins");

 script_dependencies("smb_hotfixes.nasl", "ms_bulletin_checks_possible.nasl");
 script_require_keys("SMB/MS_Bulletin_Checks/Possible");
 script_require_ports(139, 445, "Host/patch_management_checks");

 exit(0);
}

include("smb_hotfixes.inc");
include("smb_hotfixes_fcheck.inc");
include("misc_func.inc");

get_kb_item_or_exit("SMB/MS_Bulletin_Checks/Possible");

bulletin = 'MS01-025';
kbs = make_list("294472", "296185");
if (get_kb_item("Host/patch_management_checks")) hotfix_check_3rd_party(bulletin:bulletin, kbs:kbs, severity:SECURITY_HOLE);


get_kb_item_or_exit('SMB/Registry/Enumerated');
get_kb_item_or_exit('SMB/WindowsVersion', exit_code:1);

if (hotfix_check_sp(nt:7, win2k:3) <= 0) exit(0, "The host is not affected based on its version / service pack.");



if (
  hotfix_missing(name:"Q299444") > 0 &&
  hotfix_missing(name:"Q296185") > 0 &&
  hotfix_missing(name:"Q294472") > 0 &&
  hotfix_missing(name:"SP2SRP1") > 0
)
{
  if (hotfix_missing(name:"Q296185") > 0) kb = "296185";
  else kb = "294472";

  if (
    defined_func("report_xml_tag") &&
    !isnull(bulletin) &&
    !isnull(kb)
  ) report_xml_tag(tag:bulletin, value:kb);

  hotfix_security_hole();
  set_kb_item(name:"SMB/Missing/"+bulletin, value:TRUE);
  exit(0);
}
else exit(0, "The host is not affected.");