Vulnerabilities > CVE-2002-1142 - Unspecified vulnerability in Microsoft Data Access Components, IE and Internet Explorer
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
Heap-based buffer overflow in the Remote Data Services (RDS) component of Microsoft Data Access Components (MDAC) 2.1 through 2.6, and Internet Explorer 5.01 through 6.0, allows remote attackers to execute code via a malformed HTTP request to the Data Stub.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 11 |
Exploit-Db
description | Microsoft IIS MDAC msadcs.dll RDS DataStub Content-Type Overflow. CVE-2002-1142. Remote exploit for windows platform |
id | EDB-ID:19026 |
last seen | 2016-02-02 |
modified | 2012-06-08 |
published | 2012-06-08 |
reporter | metasploit |
source | https://www.exploit-db.com/download/19026/ |
title | Microsoft IIS MDAC msadcs.dll RDS DataStub Content-Type Overflow |
Metasploit
description | This module can be used to execute arbitrary code on IIS servers that expose the /msadc/msadcs.dll Microsoft Data Access Components (MDAC) Remote Data Service (RDS) DataFactory service. The service is exploitable even when RDS is configured to deny remote connections (handsafe.reg). The service is vulnerable to a heap overflow where the RDS DataStub 'Content-Type' string is overly long. Microsoft Data Access Components (MDAC) 2.1 through 2.6 are known to be vulnerable. |
id | MSF:EXPLOIT/WINDOWS/IIS/MS02_065_MSADC |
last seen | 2020-05-23 |
modified | 2017-11-08 |
published | 2012-06-07 |
references | |
reporter | Rapid7 |
source | https://github.com/rapid7/metasploit-framework/blob/master//modules/exploits/windows/iis/ms02_065_msadc.rb |
title | MS02-065 Microsoft IIS MDAC msadcs.dll RDS DataStub Content-Type Overflow |
Nessus
NASL family | Web Servers |
NASL id | MSADCS_OVERFLOW.NASL |
description | The remote DLL /msadc/msadcs.dll is accessible by anyone. Several flaws have been found in it in the past. We recommend that you restrict access to MSADC only to trusted hosts. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 11161 |
published | 2002-11-22 |
reporter | This script is Copyright (C) 2002-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/11161 |
title | Microsoft Data Access Components RDS Data Stub Remote Overflow |
code |
|
Oval
accepted 2008-05-05T04:00:18.440-04:00 class vulnerability contributors name Ingrid Skoog organization The MITRE Corporation name Andrew Buttner organization The MITRE Corporation name Robert L. Hollis organization ThreatGuard, Inc. name Jeff Cheng organization Opsware, Inc. name Clifford Farrugia organization GFI Software
description Heap-based buffer overflow in the Remote Data Services (RDS) component of Microsoft Data Access Components (MDAC) 2.1 through 2.6, and Internet Explorer 5.01 through 6.0, allows remote attackers to execute code via a malformed HTTP request to the Data Stub. family windows id oval:org.mitre.oval:def:2730 status accepted submitted 2004-08-24T12:00:00.000-04:00 title Microsoft Data Access Components 2.5 Remote Data Services Buffer Overflow version 9 accepted 2008-05-05T04:00:19.709-04:00 class vulnerability contributors name Ingrid Skoog organization The MITRE Corporation name Andrew Buttner organization The MITRE Corporation name Robert L. Hollis organization ThreatGuard, Inc. name Jeff Cheng organization Opsware, Inc. name Clifford Farrugia organization GFI Software
description Heap-based buffer overflow in the Remote Data Services (RDS) component of Microsoft Data Access Components (MDAC) 2.1 through 2.6, and Internet Explorer 5.01 through 6.0, allows remote attackers to execute code via a malformed HTTP request to the Data Stub. family windows id oval:org.mitre.oval:def:294 status accepted submitted 2004-08-24T12:00:00.000-04:00 title Microsoft Data Access Components 2.6 Remote Data Services Buffer Overflow version 9 accepted 2008-05-05T04:00:20.879-04:00 class vulnerability contributors name Ingrid Skoog organization The MITRE Corporation name Andrew Buttner organization The MITRE Corporation name Robert L. Hollis organization ThreatGuard, Inc. name Jeff Cheng organization Opsware, Inc. name Clifford Farrugia organization GFI Software
description Heap-based buffer overflow in the Remote Data Services (RDS) component of Microsoft Data Access Components (MDAC) 2.1 through 2.6, and Internet Explorer 5.01 through 6.0, allows remote attackers to execute code via a malformed HTTP request to the Data Stub. family windows id oval:org.mitre.oval:def:3573 status accepted submitted 2004-08-24T12:00:00.000-04:00 title Microsoft Data Access Components 2.1 Remote Data Services Buffer Overflow version 9
Packetstorm
data source | https://packetstormsecurity.com/files/download/113354/ms02_065_msadc.rb.txt |
id | PACKETSTORM:113354 |
last seen | 2016-12-05 |
published | 2012-06-07 |
reporter | patrick |
source | https://packetstormsecurity.com/files/113354/Microsoft-IIS-MDAC-msadcs.dll-RDS-DataStub-Content-Type-Overflow.html |
title | Microsoft IIS MDAC msadcs.dll RDS DataStub Content-Type Overflow |
References
- http://www.cert.org/advisories/CA-2002-33.html
- http://www.foundstone.com/knowledge/randd-advisories-display.html?id=337
- http://archives.neohapsis.com/archives/vulnwatch/2002-q4/0082.html
- http://www.kb.cert.org/vuls/id/542081
- http://www.securityfocus.com/bid/6214
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3573
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A294
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2730
- https://exchange.xforce.ibmcloud.com/vulnerabilities/10669
- https://exchange.xforce.ibmcloud.com/vulnerabilities/10659
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2002/ms02-065