Vulnerabilities > CVE-2003-0117 - Unspecified vulnerability in Microsoft Biztalk Server 2002

047910
CVSS 7.5 - HIGH
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
PARTIAL
Availability impact
PARTIAL
network
low complexity
microsoft
nessus
exploit available

Summary

Buffer overflow in the HTTP receiver function (BizTalkHTTPReceive.dll ISAPI) of Microsoft BizTalk Server 2002 allows attackers to execute arbitrary code via a certain request to the HTTP receiver.

Vulnerable Configurations

Part Description Count
Application
Microsoft
2

Exploit-Db

descriptionMicrosoft BizTalk Server 2002 HTTP Receiver Buffer Overflow Vulnerability. CVE-2003-0117. Dos exploit for windows platform
idEDB-ID:22553
last seen2016-02-02
modified2003-04-30
published2003-04-30
reporterCesar Cerrudo
sourcehttps://www.exploit-db.com/download/22553/
titleMicrosoft BizTalk Server 2002 HTTP Receiver Buffer Overflow Vulnerability

Nessus

NASL familyCGI abuses
NASL idBIZTALK_FLAWS.NASL
descriptionThe remote host seems to be running Microsoft BizTalk server. There are two flaws in this software that could allow an attacker to issue a SQL insertion attack or to execute arbitrary code on the remote host. Note that Nessus solely relied on the presence of a Biztalk DLL to issue this alert so it might be a false positive.
last seen2020-06-01
modified2020-06-02
plugin id11638
published2003-05-20
reporterThis script is Copyright (C) 2003-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/11638
titleMicrosoft BizTalk Server Multiple Remote Vulnerabilities
code
#
# (C) Tenable Network Security, Inc.
#


include("compat.inc");


if (description)
{
 script_id(11638);
 script_version("1.31");
 script_cvs_date("Date: 2018/11/15 20:50:16");

 script_cve_id("CVE-2003-0117", "CVE-2003-0118");
 script_bugtraq_id(7469, 7470);
 script_xref(name:"MSFT", value: "MS03-016");
 script_xref(name:"Secunia", value:"8707");
 script_xref(name:"MSKB", value:"815206");

 script_name(english:"Microsoft BizTalk Server Multiple Remote Vulnerabilities");
 script_summary(english:"Determines if BizTalk is installed");

 script_set_attribute(attribute:"synopsis", value:
"The remote business process management service has multiple
vulnerabilities." );
 script_set_attribute(attribute:"description", value:
"The remote host seems to be running Microsoft BizTalk server. 

There are two flaws in this software that could allow an attacker to
issue a SQL insertion attack or to execute arbitrary code on the
remote host. 

Note that Nessus solely relied on the presence of a Biztalk DLL to
issue this alert so it might be a false positive.");
 script_set_attribute(
   attribute:"see_also",
   value:"https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2003/ms03-016"
 );
 script_set_attribute(attribute:"solution", value:
"Apply the relevant patches referenced in Microsoft Security Bulletin
MS03-016.");
 script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
 script_set_cvss_temporal_vector("CVSS2#E:F/RL:OF/RC:C");
 script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
 script_set_attribute(attribute:"exploit_available", value:"true");

 script_set_attribute(attribute:"vuln_publication_date", value:"2003/04/30");
 script_set_attribute(attribute:"plugin_publication_date", value:"2003/05/20");

 script_set_attribute(attribute:"plugin_type", value:"remote");
 script_end_attributes();

 script_category(ACT_GATHER_INFO);
 script_family(english:"CGI abuses");
 script_copyright(english:"This script is Copyright (C) 2003-2018 Tenable Network Security, Inc.");

 script_dependencie("http_version.nasl", "find_service1.nasl", "no404.nasl");
 script_require_ports("Services/www", 80);
 script_exclude_keys("Settings/disable_cgi_scanning");
 exit(0);
}

include("global_settings.inc");
include("misc_func.inc");
include("http.inc");


port = get_http_port(default:80);
if (get_kb_item("www/no404/"+port)) exit(1, "The web server on port "+port+" does not return 404 codes.");

if (thorough_tests)
  dirs = get_kb_list(string("www/", port, "/content/directories"));
if(isnull(dirs))dirs = make_list();
dirs = list_uniq(make_list(dirs, cgi_dirs()));
	
foreach d (dirs)
{
   url = d + "/biztalkhttpreceive.dll";
   if (! is_cgi_installed3(item:url, port:port) ) 
     continue;
 
   rq = http_mk_post_req( port: port, data: rand_str(length: 8),
       			  item: url);
 
 #
 # We might do multiple retries as the CGI sometimes stalls
 # when it has received a bad request first.
 # 
  for (i = 0; i < 3; i ++)
  {
    r = http_send_recv_req(port: port, req: rq, exit_on_fail: 1);
    if ("HTTP/1.1 500 Internal Server Error" >< r[0])
    {
      if (report_verbosity > 0)
      {
        report = '\n  URL : ' + build_url(port:port, qs:url) +
                 '\n';
        security_hole(port:port, extra:report);
      }
      else security_hole(port);
      exit(0);
    }

    # The script did not stall
    if ("HTTP/1.1 100 Continue" >!< r[0] ) break;
    sleep(1);
 }
}