Vulnerabilities > CVE-2003-0226 - Unspecified vulnerability in Microsoft Internet Information Services 5.0

047910
CVSS 5.0 - MEDIUM
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
NONE
Integrity impact
NONE
Availability impact
PARTIAL
network
low complexity
microsoft
nessus
exploit available

Summary

Microsoft Internet Information Services (IIS) 5.0 and 5.1 allows remote attackers to cause a denial of service via a long WebDAV request with a (1) PROPFIND or (2) SEARCH method, which generates an error condition that is not properly handled.

Vulnerable Configurations

Part Description Count
Application
Microsoft
1

Exploit-Db

  • descriptionMS Windows IIS 5.0 - 5.1 Remote Denial of Service Exploit. CVE-2003-0226. Dos exploit for windows platform
    idEDB-ID:35
    last seen2016-01-31
    modified2003-05-31
    published2003-05-31
    reporterShachank
    sourcehttps://www.exploit-db.com/download/35/
    titleMicrosoft Windows IIS 5.0 - 5.1 - Remote Denial of Service Exploit
  • descriptionMicrosoft IIS 5 WebDAV PROPFIND and SEARCH Method Denial of Service Vulnerability. CVE-2003-0226. Remote exploit for windows platform
    idEDB-ID:22670
    last seen2016-02-02
    modified2003-05-28
    published2003-05-28
    reporterNeo1
    sourcehttps://www.exploit-db.com/download/22670/
    titleMicrosoft IIS 5 WebDAV - PROPFIND and SEARCH Method Denial of Service Vulnerability

Nessus

NASL familyWindows : Microsoft Bulletins
NASL idSMB_NT_MS03-018.NASL
descriptionThe remote host is running a version of IIS that contains various flaws that could allow remote attackers to disable this service remotely and local attackers (or remote attackers with the ability to upload arbitrary files on this server) to gain SYSTEM level access on this host.
last seen2020-06-01
modified2020-06-02
plugin id11683
published2003-06-02
reporterThis script is Copyright (C) 2003-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/11683
titleMS03-018: Cumulative Patch for Internet Information Services (11114)
code
#
# (C) Tenable Network Security, Inc.
#

include("compat.inc");

if (description)
{
 script_id(11683);
 script_version("1.42");
 script_cvs_date("Date: 2018/11/15 20:50:29");

 script_cve_id(
   "CVE-2003-0223",
   "CVE-2003-0224",
   "CVE-2003-0225",
   "CVE-2003-0226"
 );
 script_bugtraq_id(7731, 7733, 7734, 7735);
 script_xref(name:"MSFT", value:"MS03-018");
 script_xref(name:"MSKB", value:"811114");

 script_name(english:"MS03-018: Cumulative Patch for Internet Information Services (11114)");
 script_summary(english:"Determines if HF Q811114 has been installed");

 script_set_attribute(attribute:"synopsis", value:"Arbitrary code can be executed on the remote web server.");
 script_set_attribute(attribute:"description", value:
"The remote host is running a version of IIS that contains various flaws
that could allow remote attackers to disable this service remotely and
local attackers (or remote attackers with the ability to upload
arbitrary files on this server) to gain SYSTEM level access on this
host.");
 script_set_attribute(attribute:"see_also", value:"https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2003/ms03-018");
 script_set_attribute(attribute:"solution", value:"Microsoft has released a set of patches for IIS 4.0, 5.0 and 5.1.");
 script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
 script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
 script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H");
 script_set_cvss3_temporal_vector("CVSS:3.0/E:P/RL:O/RC:C");
 script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
 script_set_attribute(attribute:"exploit_available", value:"true");

 script_set_attribute(attribute:"vuln_publication_date", value:"2003/04/18");
 script_set_attribute(attribute:"patch_publication_date", value:"2003/05/28");
 script_set_attribute(attribute:"plugin_publication_date", value:"2003/06/02");

 script_set_attribute(attribute:"plugin_type", value:"local");
 script_set_attribute(attribute:"cpe", value:"cpe:/o:microsoft:windows");
 script_end_attributes();

 script_category(ACT_GATHER_INFO);
 script_copyright(english:"This script is Copyright (C) 2003-2018 Tenable Network Security, Inc.");
 script_family(english:"Windows : Microsoft Bulletins");

 script_dependencies("smb_hotfixes.nasl", "ms_bulletin_checks_possible.nasl");
 script_require_keys("SMB/MS_Bulletin_Checks/Possible");
 script_require_ports(139, 445, 'Host/patch_management_checks');
 exit(0);
}

include("audit.inc");
include("smb_func.inc");
include("smb_hotfixes.inc");
include("smb_hotfixes_fcheck.inc");
include("misc_func.inc");

get_kb_item_or_exit("SMB/MS_Bulletin_Checks/Possible");

bulletin = 'MS03-018';
kb = "811114";

kbs = make_list(kb);
if (get_kb_item("Host/patch_management_checks")) hotfix_check_3rd_party(bulletin:bulletin, kbs:kbs, severity:SECURITY_HOLE);

get_kb_item_or_exit("SMB/Registry/Enumerated");
get_kb_item_or_exit("SMB/WindowsVersion", exit_code:1);

if (hotfix_check_sp_range(nt:'6', win2k:'2,3', xp:'0,1') <= 0) audit(AUDIT_OS_SP_NOT_VULN);
if (hotfix_check_iis_installed() <= 0) audit(AUDIT_NOT_INST, "IIS");

rootfile = hotfix_get_systemroot();
if (!rootfile) exit(1, "Failed to get the system root.");

share = hotfix_path2share(path:rootfile);
if (!is_accessible_share(share:share)) audit(AUDIT_SHARE_FAIL, share);

if (
  hotfix_is_vulnerable(os:"5.1", file:"W3svc.dll", version:"5.1.2600.1166", dir:"\system32\inetsrv", bulletin:bulletin, kb:kb) ||
  hotfix_is_vulnerable(os:"5.0", file:"W3svc.dll", version:"5.0.2195.6672", dir:"\system32\inetsrv", bulletin:bulletin, kb:kb) ||
  hotfix_is_vulnerable(os:"4.0", file:"W3svc.dll", version:"4.2.785.1",     dir:"\system32\inetsrv", bulletin:bulletin, kb:kb)
)
{
  set_kb_item(name:"SMB/Missing/"+bulletin, value:TRUE);
  hotfix_security_hole();
  hotfix_check_fversion_end();
  exit(0);
}
else
{
  hotfix_check_fversion_end();
  audit(AUDIT_HOST_NOT, 'affected');
}

Oval

accepted2007-08-02T14:47:16.660-04:00
classvulnerability
contributors
  • nameChristine Walzer
    organizationThe MITRE Corporation
  • nameChristine Walzer
    organizationThe MITRE Corporation
  • nameRobert L. Hollis
    organizationThreatGuard, Inc.
descriptionMicrosoft Internet Information Services (IIS) 5.0 and 5.1 allows remote attackers to cause a denial of service via a long WebDAV request with a (1) PROPFIND or (2) SEARCH method, which generates an error condition that is not properly handled.
familywindows
idoval:org.mitre.oval:def:933
statusaccepted
submitted2004-05-17T12:00:00.000-04:00
titleIIS WebDAV Request Denial of Service
version29

Seebug

bulletinFamilyexploit
description<p>漏洞描述: Microsoft IIS 5.0(Internet Infomation Server 5)是Microsoft Windows 2000自带的一个网络信息服务器,其中包含HTTP服务功能。IIS5 默认提供了对WebDAV的支持,通过WebDAV可以通过HTTP向用户提供远程文件存储的服务。 WebDAV实现对部分模式的超长请求处理不正确,远程攻击者可以利用这个漏洞对IIS服务进行拒绝服务攻击。 攻击者可以使用'PROPFIND'或'SEARCH'请求方法,提交包含49,153字节的Webdav请求,IIS会由于拒绝服务而重新启动。不过IIS 5.0会自动重新启动。</p><p>CVE-ID:CVE-2003-0226</p><p>CNNVD-ID:CNNVD-200306-027</p><p>CVE官方链接:<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0226" rel="nofollow">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0226</a></p><p>- 受影响的程序版本 </p><p>Microsoft IIS 5.1 </p><p>- Microsoft Windows 2000 Advanced Server SP2 </p><p>&nbsp;- Microsoft Windows 2000 Advanced Server SP1 </p><p>&nbsp;- Microsoft Windows 2000 Advanced Server </p><p>&nbsp; - Microsoft Windows 2000 Datacenter Server SP2 </p><p>- Microsoft Windows 2000 Datacenter Server SP1</p><p>&nbsp; - Microsoft Windows 2000 Datacenter Server </p><p>&nbsp; - Microsoft Windows 2000 Professional SP2</p><p>&nbsp; - Microsoft Windows 2000 Professional SP1</p><p>&nbsp; - Microsoft Windows 2000 Professional </p><p>&nbsp; - Microsoft Windows 2000 Server SP2 </p><p>&nbsp;- Microsoft Windows 2000 Server SP1 </p><p>&nbsp;- Microsoft Windows 2000 Server </p><p>+ Microsoft Windows XP 64-bit Edition SP1 </p><p>+ Microsoft Windows XP 64-bit Edition </p><p>&nbsp; + Microsoft Windows XP 64-bit Edition</p><p>&nbsp;&nbsp; - Microsoft Windows XP Home SP1</p><p>&nbsp; - Microsoft Windows XP Home SP1</p><p>&nbsp; - Microsoft Windows XP Home </p><p>- Microsoft Windows XP Home </p><p>&nbsp; + Microsoft Windows XP Professional SP1</p><p>&nbsp; + Microsoft Windows XP Professional SP1 </p><p>&nbsp;+ Microsoft Windows XP Professional </p><p>+ Microsoft Windows XP Professional Microsoft IIS 5.0 </p><p>- Microsoft Windows 2000 Advanced Server SP2</p><p>&nbsp; - Microsoft Windows 2000 Advanced Server SP2</p><p>&nbsp; - Microsoft Windows 2000 Advanced Server SP1 </p><p>&nbsp;- Microsoft Windows 2000 Advanced Server SP1</p><p>&nbsp; + Microsoft Windows 2000 Advanced Server </p><p>+ Microsoft Windows 2000 Advanced Server </p><p>- Microsoft Windows 2000 Datacenter Server SP2</p><p>&nbsp; - Microsoft Windows 2000 Datacenter Server SP2</p><p>&nbsp; - Microsoft Windows 2000 Datacenter Server SP1 </p><p>- Microsoft Windows 2000 Datacenter Server SP1</p><p>&nbsp; - Microsoft Windows 2000 Professional SP2 </p><p>- Microsoft Windows 2000 Professional SP2 </p><p>&nbsp;- Microsoft Windows 2000 Professional SP1 </p><p>&nbsp;- Microsoft Windows 2000 Professional SP1 </p><p>+ Microsoft Windows 2000 Professional </p><p>&nbsp; + Microsoft Windows 2000 Professional </p><p>&nbsp; - Microsoft Windows 2000 Server SP2</p><p>&nbsp; - Microsoft Windows 2000 Server SP2</p><p>&nbsp; - Microsoft Windows 2000 Server SP1</p><p>&nbsp; - Microsoft Windows 2000 Server SP1 </p><p>&nbsp;+ Microsoft Windows 2000 Server </p><p>&nbsp; + Microsoft Windows 2000 Server Microsoft IIS 6.0 </p><p>+ Microsoft Windows Server 2003 Datacenter Edition</p><p>&nbsp;&nbsp; + Microsoft Windows Server 2003 Datacenter Edition </p><p>&nbsp; + Microsoft Windows Server 2003 Datacenter Edition Itanium 0 </p><p>+ Microsoft Windows Server 2003 Datacenter Edition Itanium 0 </p><p>+ Microsoft Windows Server 2003 Enterprise Edition </p><p>+ Microsoft Windows Server 2003 Enterprise Edition </p><p>+ Microsoft Windows Server 2003 Enterprise Edition Itanium 0 </p><p>+ Microsoft Windows Server 2003 Enterprise Edition Itanium 0 </p><p>&nbsp;+ Microsoft Windows Server 2003 Standard Edition </p><p>+ Microsoft Windows Server 2003 Standard Edition</p><p>&nbsp;&nbsp; + Microsoft Windows Server 2003 Web Edition</p><p>&nbsp;&nbsp; + Microsoft Windows Server 2003 Web Edition</p><p>&nbsp; - 不受影响的程序版本 </p><p>Microsoft IIS 6.0 </p><p>+ Microsoft Windows Server 2003 Datacenter Edition </p><p>+ Microsoft Windows Server 2003 Datacenter Edition </p><p>&nbsp; + Microsoft Windows Server 2003 Datacenter Edition Itanium 0</p><p>&nbsp; + Microsoft Windows Server 2003 Datacenter Edition Itanium 0 </p><p>+ Microsoft Windows Server 2003 Enterprise Edition</p><p>&nbsp;&nbsp; + Microsoft Windows Server 2003 Enterprise Edition </p><p>&nbsp; + Microsoft Windows Server 2003 Enterprise Edition Itanium 0</p><p>&nbsp; + Microsoft Windows Server 2003 Enterprise Edition Itanium 0 </p><p>+ Microsoft Windows Server 2003 Standard Edition </p><p>+ Microsoft Windows Server 2003 Standard Edition </p><p>+ Microsoft Windows Server 2003 Web Edition </p><p>+ Microsoft Windows Server 2003 Web Edition </p><p>&nbsp;</p><p>解决方案:官方已发布报告,请升级到不受影响的版本或最新版本。&nbsp;</p>
idSSV:15237
last seen2017-11-19
modified2003-05-31
published2003-05-31
reporterRoot
sourcehttps://www.seebug.org/vuldb/ssvid-15237
titleMS Windows IIS 5.0 - 5.1 Remote Denial of Service Exploit