Vulnerabilities > CVE-2002-0150 - Unspecified vulnerability in Microsoft products
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN microsoft
nessus
Summary
Buffer overflow in Internet Information Server (IIS) 4.0, 5.0, and 5.1 allows remote attackers to spoof the safety check for HTTP headers and cause a denial of service or execute arbitrary code via HTTP header field values.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 2 |
Nessus
NASL family Windows : Microsoft Bulletins NASL id SMB_NT_MS02-018.NASL description The remote version of Windows contains multiple flaws in the Internet Information Service (IIS), such as heap overflow, DoS, and XSS that could allow an attacker to execute arbitrary code on the remote host with SYSTEM privileges. last seen 2020-06-01 modified 2020-06-02 plugin id 10943 published 2002-04-23 reporter This script is Copyright (C) 2002-2018 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/10943 title MS02-018: Cumulative Patch for Internet Information Services (327696) NASL family CGI abuses NASL id IIS_XSS_404.NASL description This IIS Server appears to be vulnerable to one of the cross-site scripting attacks described in MS02-018. The default last seen 2020-06-01 modified 2020-06-02 plugin id 10936 published 2002-04-11 reporter This script is Copyright (C) 2002-2018 Matt Moore source https://www.tenable.com/plugins/nessus/10936 title Microsoft IIS Multiple Vulnerabilities (MS02-018)
Oval
accepted 2007-05-23T15:05:27.660-04:00 class vulnerability contributors name Tiffany Bergeron organization The MITRE Corporation name Glenn Strickland organization Secure Elements, Inc. name Josh Turpin organization Symantec Corporation
description Buffer overflow in Internet Information Server (IIS) 4.0, 5.0, and 5.1 allows remote attackers to spoof the safety check for HTTP headers and cause a denial of service or execute arbitrary code via HTTP header field values. family windows id oval:org.mitre.oval:def:137 status deprecated submitted 2004-01-14T12:00:00.000-04:00 title DEPRECATED: Windows NT IIS HTTP Header Field Buffer Overflow version 29 accepted 2010-12-20T04:00:56.252-05:00 class vulnerability contributors name Tiffany Bergeron organization The MITRE Corporation name Glenn Strickland organization Secure Elements, Inc. name Shane Shaffer organization G2, Inc. name Josh Turpin organization Symantec Corporation name Sudhir Gandhe organization Telos name Shane Shaffer organization G2, Inc.
description Buffer overflow in Internet Information Server (IIS) 4.0, 5.0, and 5.1 allows remote attackers to spoof the safety check for HTTP headers and cause a denial of service or execute arbitrary code via HTTP header field values. family windows id oval:org.mitre.oval:def:39 status deprecated submitted 2004-01-14T12:00:00.000-04:00 title DEPRECATED: Windows 2000 IIS HTTP Header Field Buffer Overflow version 33
References
- http://www.cert.org/advisories/CA-2002-09.html
- http://www.cert.org/advisories/CA-2002-09.html
- http://www.cisco.com/warp/public/707/Microsoft-IIS-vulnerabilities-MS02-018.shtml
- http://www.cisco.com/warp/public/707/Microsoft-IIS-vulnerabilities-MS02-018.shtml
- http://www.iss.net/security_center/static/8797.php
- http://www.iss.net/security_center/static/8797.php
- http://www.kb.cert.org/vuls/id/454091
- http://www.kb.cert.org/vuls/id/454091
- http://www.osvdb.org/3316
- http://www.osvdb.org/3316
- http://www.securityfocus.com/bid/4476
- http://www.securityfocus.com/bid/4476
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2002/ms02-018
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2002/ms02-018
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A137
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A137
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A39
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A39