Vulnerabilities > CVE-2003-0822 - Unspecified vulnerability in Microsoft products

047910
CVSS 7.5 - HIGH
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
PARTIAL
Availability impact
PARTIAL
network
low complexity
microsoft
nessus
exploit available
metasploit

Summary

Buffer overflow in the debug functionality in fp30reg.dll of Microsoft FrontPage Server Extensions (FPSE) 2000 and 2002 allows remote attackers to execute arbitrary code via a crafted chunked encoded request.

Exploit-Db

  • descriptionMicrosoft IIS ISAPI FrontPage fp30reg.dll Chunked Overflow. CVE-2003-0822. Remote exploit for windows platform
    idEDB-ID:16356
    last seen2016-02-01
    modified2010-07-25
    published2010-07-25
    reportermetasploit
    sourcehttps://www.exploit-db.com/download/16356/
    titleMicrosoft IIS ISAPI FrontPage fp30reg.dll Chunked Overflow
  • descriptionMS Frontpage Server Extensions fp30reg.dll Exploit (MS03-051). CVE-2003-0822. Remote exploit for windows platform
    idEDB-ID:121
    last seen2016-01-31
    modified2003-11-13
    published2003-11-13
    reporterAdik
    sourcehttps://www.exploit-db.com/download/121/
    titleMicrosoft Frontpage Server Extensions fp30reg.dll Exploit MS03-051

Metasploit

descriptionThis is an exploit for the chunked encoding buffer overflow described in MS03-051 and originally reported by Brett Moore. This particular modules works against versions of Windows 2000 between SP0 and SP3. Service Pack 4 fixes the issue.
idMSF:EXPLOIT/WINDOWS/ISAPI/MS03_051_FP30REG_CHUNKED
last seen2020-05-23
modified2017-07-24
published2010-07-25
referenceshttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0822
reporterRapid7
sourcehttps://github.com/rapid7/metasploit-framework/blob/master//modules/exploits/windows/isapi/ms03_051_fp30reg_chunked.rb
titleMS03-051 Microsoft IIS ISAPI FrontPage fp30reg.dll Chunked Overflow

Nessus

NASL familyWeb Servers
NASL idFRONTPAGE_CHUNKED_OVERFLOW.NASL
descriptionThe remote Microsoft FrontPage server seems vulnerable to a remote buffer overflow. Exploitation of this bug could give an unauthorized user access to the machine. The following systems are known to be vulnerable: Microsoft Windows 2000 Service Pack 2, Service Pack 3 Microsoft Windows XP, Microsoft Windows XP Service Pack 1 Microsoft Office XP, Microsoft Office XP Service Release 1.
last seen2020-06-01
modified2020-06-02
plugin id11923
published2003-11-12
reporterThis script is Copyright (C) 2003-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/11923
titleMicrosoft FrontPage Server Extensions (fp30reg.dll) Debug Function Remote Overflow (MS03-051 / 813360)
code
#
# (C) Tenable Network Security, Inc.
#


include("compat.inc");

if(description)
{
 script_id(11923);
 script_version("1.37");

 script_cve_id("CVE-2003-0822", "CVE-2003-0824");
 script_bugtraq_id(9007, 9008);
 script_xref(name:"MSKB", value:"813360");
 script_xref(name:"MSFT", value:"MS03-051");

 script_name(english:"Microsoft FrontPage Server Extensions (fp30reg.dll) Debug Function Remote Overflow (MS03-051 / 813360)");

 script_set_attribute(attribute:"synopsis", value:
"It is possible to execute code on the remote host through FrontPage." );
 script_set_attribute(attribute:"description", value:
"The remote Microsoft FrontPage server seems vulnerable to a remote
buffer overflow.  Exploitation of this bug could give an unauthorized
user access to the machine.

The following systems are known to be vulnerable:

Microsoft Windows 2000 Service Pack 2, Service Pack 3
Microsoft Windows XP, Microsoft Windows XP Service Pack 1
Microsoft Office XP, Microsoft Office XP Service Release 1." );
 script_set_attribute(attribute:"solution", value: "Apply patch MS03-051." );
 script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
 script_set_cvss_temporal_vector("CVSS2#E:F/RL:OF/RC:C");
 script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
 script_set_attribute(attribute:"exploit_available", value:"true");
 script_set_attribute(attribute:"metasploit_name", value:'MS03-051 Microsoft IIS ISAPI FrontPage fp30reg.dll Chunked Overflow');
 script_set_attribute(attribute:"exploit_framework_metasploit", value:"true");
 script_set_attribute(attribute:"exploit_framework_canvas", value:"true");
 script_set_attribute(attribute:"canvas_package", value:'CANVAS');
 script_set_attribute(attribute:"see_also", value:
"https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2003/ms03-051" );

 script_set_attribute(attribute:"plugin_publication_date", value: "2003/11/12");
 script_set_attribute(attribute:"vuln_publication_date", value: "2003/11/11");
 script_cvs_date("Date: 2018/11/15 20:50:25");

script_set_attribute(attribute:"plugin_type", value:"remote");
script_end_attributes();

 script_summary(english: "IIS FrontPage MS03-051");
 script_category(ACT_ATTACK);
 script_copyright(english:"This script is Copyright (C) 2003-2018 Tenable Network Security, Inc.");
 script_family(english: "Web Servers");
 script_dependencie("httpver.nasl","http_version.nasl","no404.nasl");
 script_require_ports("Services/www", 80);
 exit(0);
}

include("global_settings.inc");
include("misc_func.inc");
include("http.inc");

port = get_http_port(default:80);

banner = get_http_banner(port:port);
if ("Microsoft-IIS" >!< banner)
  exit (0);

h = make_array("Transfer-Encoding", "chunked");

r = http_send_recv3(port: port, method: "POST", 
  item: "/_vti_bin/_vti_aut/fp30reg.dll", 
  add_headers: h, 
  data: '1\r\n\r\nX\r\n0\r\n\r\n');
if (isnull(r)) exit(0);

if (! egrep(string:r[1], pattern:"^Server: Microsoft-IIS/5\.[01].*")) exit(0);

    # here we manually inspect replies to a bogus chunked request
    # an unpatched IIS 5.x server will respond to this query with a '200 OK'

r2 = http_send_recv3(port: port, method: "POST", 
   item: "/_vti_bin/_vti_aut/fp30reg.dll",
   add_headers: h,
   data: '0\r\n\r\nX\r\n0\r\n\r\n');
if (isnull(r2)) exit(0);

no404 = get_kb_item(strcat("www/no404/",port));
if (! isnull(no404) && no404 >< r2[2]) exit(0);

if (r2[0] =~ "^HTTP/1\.[01] 200 ")
 security_hole(port);
else
 set_kb_item(name:"SMB/KB813360", value:TRUE);

Oval

  • accepted2011-05-16T04:02:50.513-04:00
    classvulnerability
    contributors
    • nameAndrew Buttner
      organizationThe MITRE Corporation
    • nameAndrew Buttner
      organizationThe MITRE Corporation
    • nameChristine Walzer
      organizationThe MITRE Corporation
    • nameChristine Walzer
      organizationThe MITRE Corporation
    • nameShane Shaffer
      organizationG2, Inc.
    • nameSudhir Gandhe
      organizationTelos
    • nameShane Shaffer
      organizationG2, Inc.
    descriptionBuffer overflow in the debug functionality in fp30reg.dll of Microsoft FrontPage Server Extensions (FPSE) 2000 and 2002 allows remote attackers to execute arbitrary code via a crafted chunked encoded request.
    familywindows
    idoval:org.mitre.oval:def:364
    statusaccepted
    submitted2003-12-09T12:00:00.000-04:00
    titleMS FrontPage Server Extensions Chunked Encoded Request Buffer Overflow (Test 1)
    version13
  • accepted2011-05-16T04:02:50.905-04:00
    classvulnerability
    contributors
    • nameAndrew Buttner
      organizationThe MITRE Corporation
    • nameAndrew Buttner
      organizationThe MITRE Corporation
    • nameChristine Walzer
      organizationThe MITRE Corporation
    • nameJonathan Baker
      organizationThe MITRE Corporation
    • nameShane Shaffer
      organizationG2, Inc.
    • nameSudhir Gandhe
      organizationTelos
    • nameShane Shaffer
      organizationG2, Inc.
    definition_extensions
    commentMicrosoft Windows NT is installed
    ovaloval:org.mitre.oval:def:36
    descriptionBuffer overflow in the debug functionality in fp30reg.dll of Microsoft FrontPage Server Extensions (FPSE) 2000 and 2002 allows remote attackers to execute arbitrary code via a crafted chunked encoded request.
    familywindows
    idoval:org.mitre.oval:def:366
    statusaccepted
    submitted2003-12-09T12:00:00.000-04:00
    titleMS FrontPage Server Extensions Chunked Encoded Request Buffer Overflow (Test 2)
    version29
  • accepted2011-05-16T04:02:51.402-04:00
    classvulnerability
    contributors
    • nameAndrew Buttner
      organizationThe MITRE Corporation
    • nameAndrew Buttner
      organizationThe MITRE Corporation
    • nameChristine Walzer
      organizationThe MITRE Corporation
    • nameShane Shaffer
      organizationG2, Inc.
    • nameSudhir Gandhe
      organizationTelos
    • nameShane Shaffer
      organizationG2, Inc.
    descriptionBuffer overflow in the debug functionality in fp30reg.dll of Microsoft FrontPage Server Extensions (FPSE) 2000 and 2002 allows remote attackers to execute arbitrary code via a crafted chunked encoded request.
    familywindows
    idoval:org.mitre.oval:def:367
    statusaccepted
    submitted2003-12-09T12:00:00.000-04:00
    titleMS FrontPage Server Extensions Chunked Encoded Request Buffer Overflow (Test 3)
    version13
  • accepted2008-03-24T04:00:50.398-04:00
    classvulnerability
    contributors
    • nameAndrew Buttner
      organizationThe MITRE Corporation
    • nameAndrew Buttner
      organizationThe MITRE Corporation
    • nameChristine Walzer
      organizationThe MITRE Corporation
    • nameChristine Walzer
      organizationThe MITRE Corporation
    • nameJonathan Baker
      organizationThe MITRE Corporation
    • nameJonathan Baker
      organizationThe MITRE Corporation
    definition_extensions
    commentMicrosoft Windows NT is installed
    ovaloval:org.mitre.oval:def:36
    descriptionBuffer overflow in the debug functionality in fp30reg.dll of Microsoft FrontPage Server Extensions (FPSE) 2000 and 2002 allows remote attackers to execute arbitrary code via a crafted chunked encoded request.
    familywindows
    idoval:org.mitre.oval:def:699
    statusaccepted
    submitted2003-03-04T12:00:00.000-04:00
    titleMS FrontPage Server Extensions Chunked Encoded Request Buffer Overflow (Test 4)
    version24
  • accepted2011-05-16T04:03:25.346-04:00
    classvulnerability
    contributors
    • nameTiffany Bergeron
      organizationThe MITRE Corporation
    • nameAndrew Buttner
      organizationThe MITRE Corporation
    • nameChristine Walzer
      organizationThe MITRE Corporation
    • nameChristine Walzer
      organizationThe MITRE Corporation
    • nameAnna Min
      organizationBigFix, Inc
    • nameSudhir Gandhe
      organizationTelos
    • nameShane Shaffer
      organizationG2, Inc.
    descriptionBuffer overflow in the debug functionality in fp30reg.dll of Microsoft FrontPage Server Extensions (FPSE) 2000 and 2002 allows remote attackers to execute arbitrary code via a crafted chunked encoded request.
    familywindows
    idoval:org.mitre.oval:def:743
    statusaccepted
    submitted2003-03-04T12:00:00.000-04:00
    titleMS FrontPage Server Extensions Chunked Encoded Request Buffer Overflow (Test 5)
    version12

Packetstorm

Saint

bid9007
descriptionFrontPage fp30reg.dll remote debug buffer overflow
idweb_cms_fp_remotedebug
osvdb2952
titlefrontpage_remote_debug
typeremote

Seebug

bulletinFamilyexploit
description<p><strong>漏洞描述:</strong></p><p>Microsoft FrontPage服务器扩展是Microsoft公司开发的用于加强IIS Web服务器的功能的软件包。Microsoft FrontPage Server Extensions存在两个新的安全漏洞,可导致远程攻击者可以利用这个漏洞进行缓冲区溢出攻击,可能以FrontPage进程权限在系统上执行任意指令。 第一个漏洞是由于FrontPage服务扩展的远程调试功能上存在缓冲区溢出,这个功能用于用户远程连接FrontPage服务扩展的服务器和远程调试内容使用,如Visual Interdev。攻击者成功利用这个漏洞可以以本地SYSTEM权限在系统上执行任意指令,然后在系统上执行任意操作,如安装程序,查看更改或删除数据,建立拥有全部权限的帐户等。 第二个漏洞存在与SmartHTML解析器中,提供对WEB表单和其他基于FrontPage动态内容的支持,攻击者利用这个漏洞可以使运行FrontPage服务扩展的服务器临时停止对正常请求的响应。</p><p><strong>漏洞影响:</strong></p><p>受影响的系统:</p><p>&nbsp;•Microsoft Windows 2000 Service Pack 2, Service Pack 3</p><p>•Microsoft Windows XP, Microsoft Windows XP Service Pack 1</p><p>•Microsoft Windows XP 64-Bit Edition, Microsoft Windows XP 64-Bit Edition Service Pack 1</p><p>•Microsoft Office XP, Microsoft Office XP Service Pack 1, Service Pack 2</p><p>•Microsoft Office 2000 Server Extensions</p><p>不受影响的系统: </p><p>•Microsoft Windows Millennium Edition </p><p>•Microsoft Windows NT Workstation 4.0, Service Pack 6a </p><p>•Microsoft Windows NT Server 4.0, Service Pack 6a </p><p>•Microsoft Windows NT Server 4.0, Terminal Server Edition, Service Pack 6 </p><p>•Microsoft Windows 2000 Service Pack 4 </p><p>•Microsoft Windows XP 64-Bit Edition Version 2003 </p><p>•Microsoft Windows Server 2003 (Windows SharePoint Services) </p><p>•Microsoft Windows Server 2003 64-Bit Edition (Windows SharePoint Services)</p><p>•Microsoft Office System 2003 </p><p>Affected Components: </p><p>•Microsoft FrontPage Server Extensions 2000 (For Windows NT4) and Microsoft Office 2000 Server Extensions (Shipped with Office 2000)</p><p>•Microsoft FrontPage Server Extensions 2000 (Shipped with Windows 2000)</p><p>•Microsoft FrontPage Server Extensions 2000 (Shipped with Windows XP) </p><p>•Microsoft FrontPage Server Extensions 2000 64-bit (Shipped with Windows XP 64-bit)</p><p>•Microsoft FrontPage Server Extensions 2002 </p><p>•Microsoft SharePoint Team Services 2002 (Shipped with Office XP)</p><p><strong>CVE-ID:CVE-2003-0822,CVE-2003-0824 </strong></p><p><strong>CNNVD-ID:CNNVD-200312-061,CNNVD-200312-053</strong></p><p><strong>CNVD-ID:CNVD-2003-3292</strong> </p><p><strong></strong>&nbsp;</p><p><strong>解决方案:</strong></p><p>Microsoft </p><p>--------- </p><p>Microsoft已经为此发布了一个安全公告(MS03-051)以及相应补丁:</p><p>MS03-051:Buffer Overrun in Microsoft FrontPage Server Extensions Could Allow Code Execution (813360)链接:<a href="http://www.microsoft.com/technet/security/bulletin/MS03-051.asp">http://www.microsoft.com/technet/security/bulletin/MS03-051.asp</a></p><p>补丁下载:Microsoft FrontPage Server Extensions 2000 <a href="http://www.microsoft.com/downloads/details.aspx?FamilyId=C84C3D10-A821-4819-BF58-D3BC70A77BFA&amp;displaylang=en">http://www.microsoft.com/downloads/details.aspx?FamilyId=C84C3D10-A821-4819-BF58-D3BC70A77BFA&amp;displaylang=en</a> </p><p>Microsoft FrontPage Server Extensions 2000 (Shipped with Windows 2000) <a href="http://www.microsoft.com/downloads/details.aspx?FamilyId=057D5F0E-0E2B-47D2-9F0F-3B15DD8622A2&amp;displaylang=en">http://www.microsoft.com/downloads/details.aspx?FamilyId=057D5F0E-0E2B-47D2-9F0F-3B15DD8622A2&amp;displaylang=en</a> </p><p>Microsoft FrontPage Server Extensions 2000 (Shipped with Windows XP) <a href="http://www.microsoft.com/downloads/details.aspx?FamilyId=9B302532-BFAB-489B-82DC-ED1E49A16E1C&amp;displaylang=en">http://www.microsoft.com/downloads/details.aspx?FamilyId=9B302532-BFAB-489B-82DC-ED1E49A16E1C&amp;displaylang=en</a> </p><p>Microsoft FrontPage Server Extensions 2002 <a href="http://www.microsoft.com/downloads/details.aspx?FamilyId=3E8A21D9-708E-4E69-8299-86C49321EE25&amp;displaylang=en">http://www.microsoft.com/downloads/details.aspx?FamilyId=3E8A21D9-708E-4E69-8299-86C49321EE25&amp;displaylang=en</a> </p><p>Microsoft SharePoint Team Services 2002 (shipped with Office XP) <a href="http://www.microsoft.com/downloads/details.aspx?FamilyId=5923FC2F-D786-4E32-8F15-36A1C9E0A340&amp;displaylang=en">http://www.microsoft.com/downloads/details.aspx?FamilyId=5923FC2F-D786-4E32-8F15-36A1C9E0A340&amp;displaylang=en</a></p>
idSSV:13803
last seen2017-11-19
modified2003-11-13
published2003-11-13
reporterRoot
sourcehttps://www.seebug.org/vuldb/ssvid-13803
titleMS Frontpage Server Extensions fp30reg.dll Exploit (MS03-051)