Vulnerabilities > CVE-2001-0245 - Remote Security vulnerability in Microsoft Index Server and Indexing Service

047910
CVSS 5.0 - MEDIUM
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
NONE
Availability impact
NONE
network
low complexity
microsoft
nessus

Summary

Microsoft Index Server 2.0 in Windows NT 4.0, and Indexing Service in Windows 2000, allows remote attackers to read server-side include files via a malformed search request, aka a new variant of the "Malformed Hit-Highlighting" vulnerability.

Vulnerable Configurations

Part Description Count
Application
Microsoft
2

Nessus

NASL familyWindows : Microsoft Bulletins
NASL idSMB_NT_MS01-025.NASL
descriptionThe hotfix for the
last seen2020-06-01
modified2020-06-02
plugin id10668
published2001-05-13
reporterThis script is Copyright (C) 2001-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/10668
titleMS01-025: Index Server Multiple Vulnerabilities (294472 / 296185)
code
#
# (C) Tenable Network Security, Inc.
#

include("compat.inc");

if (description)
{
 script_id(10668);
 script_version("1.51");
 script_cvs_date("Date: 2018/11/15 20:50:29");

 script_cve_id("CVE-2001-0244", "CVE-2001-0245");
 script_bugtraq_id(2709);
 script_xref(name:"MSFT", value:"MS01-025");
 script_xref(name:"CERT", value:"655248");
 script_xref(name:"MSKB", value:"294472");
 script_xref(name:"MSKB", value:"296185");

 script_name(english:"MS01-025: Index Server Multiple Vulnerabilities (294472 / 296185)");
 script_summary(english:"Determines whether the hotfixes Q294472 and Q296185 are installed");

 script_set_attribute(attribute:"synopsis", value:"Arbitrary code can be executed on the remote host.");
 script_set_attribute(attribute:"description", value:
"The hotfix for the 'Malformed request to index server' problem has not
been applied.

This vulnerability can allow an attacker to execute arbitrary code on
the remote host.");
 script_set_attribute(attribute:"see_also", value:"https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2001/ms01-025");
 script_set_attribute(attribute:"solution", value:
"Microsoft has released a set of patches for Index Server 2.0 and
Windows 2000.");
 script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
 script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
 script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H");
 script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
 script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
 script_set_attribute(attribute:"exploit_available", value:"false");

 script_set_attribute(attribute:"vuln_publication_date", value:"2001/05/10");
 script_set_attribute(attribute:"patch_publication_date", value:"2001/05/10");
 script_set_attribute(attribute:"plugin_publication_date", value:"2001/05/13");

 script_set_attribute(attribute:"plugin_type", value:"local");
 script_set_attribute(attribute:"cpe", value:"cpe:/o:microsoft:windows");
 script_end_attributes();

 script_category(ACT_GATHER_INFO);
 script_copyright(english:"This script is Copyright (C) 2001-2018 Tenable Network Security, Inc.");
 script_family(english:"Windows : Microsoft Bulletins");

 script_dependencies("smb_hotfixes.nasl", "ms_bulletin_checks_possible.nasl");
 script_require_keys("SMB/MS_Bulletin_Checks/Possible");
 script_require_ports(139, 445, "Host/patch_management_checks");

 exit(0);
}

include("smb_hotfixes.inc");
include("smb_hotfixes_fcheck.inc");
include("misc_func.inc");

get_kb_item_or_exit("SMB/MS_Bulletin_Checks/Possible");

bulletin = 'MS01-025';
kbs = make_list("294472", "296185");
if (get_kb_item("Host/patch_management_checks")) hotfix_check_3rd_party(bulletin:bulletin, kbs:kbs, severity:SECURITY_HOLE);


get_kb_item_or_exit('SMB/Registry/Enumerated');
get_kb_item_or_exit('SMB/WindowsVersion', exit_code:1);

if (hotfix_check_sp(nt:7, win2k:3) <= 0) exit(0, "The host is not affected based on its version / service pack.");



if (
  hotfix_missing(name:"Q299444") > 0 &&
  hotfix_missing(name:"Q296185") > 0 &&
  hotfix_missing(name:"Q294472") > 0 &&
  hotfix_missing(name:"SP2SRP1") > 0
)
{
  if (hotfix_missing(name:"Q296185") > 0) kb = "296185";
  else kb = "294472";

  if (
    defined_func("report_xml_tag") &&
    !isnull(bulletin) &&
    !isnull(kb)
  ) report_xml_tag(tag:bulletin, value:kb);

  hotfix_security_hole();
  set_kb_item(name:"SMB/Missing/"+bulletin, value:TRUE);
  exit(0);
}
else exit(0, "The host is not affected.");