Vulnerabilities > CVE-2005-4360 - Unchecked Return Value vulnerability in Microsoft Internet Information Services 5.1
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
The URL parser in Microsoft Internet Information Services (IIS) 5.1 on Windows XP Professional SP2 allows remote attackers to execute arbitrary code via multiple requests to ".dll" followed by arguments such as "~0" through "~9", which causes ntdll.dll to produce a return value that is not correctly handled by IIS, as demonstrated using "/_vti_bin/.dll/*/~0". NOTE: the consequence was originally believed to be only a denial of service (application crash and reboot).
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 | |
OS | 1 |
Common Weakness Enumeration (CWE)
Exploit-Db
description | MS Windows IIS Malformed HTTP Request Denial of Service Exploit (c). CVE-2005-4360. Dos exploit for windows platform |
id | EDB-ID:1376 |
last seen | 2016-01-31 |
modified | 2005-12-19 |
published | 2005-12-19 |
reporter | Kozan |
source | https://www.exploit-db.com/download/1376/ |
title | Microsoft Windows IIS - Malformed HTTP Request Denial of Service Exploit c |
Nessus
NASL family | Windows : Microsoft Bulletins |
NASL id | SMB_NT_MS07-041.NASL |
description | The remote host has a version of IIS that is vulnerable to a remote flaw that could allow an attacker to take the control of the remote web server and execute arbitrary commands on the remote host with the SYSTEM privileges. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 25692 |
published | 2007-07-10 |
reporter | This script is Copyright (C) 2007-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/25692 |
title | MS07-041: Vulnerability in Microsoft Internet Information Services Could Allow Remote Code Execution (939373) |
code |
|
Oval
accepted | 2007-08-20T08:04:38.567-04:00 | ||||||||
class | vulnerability | ||||||||
contributors |
| ||||||||
definition_extensions |
| ||||||||
description | The URL parser in Microsoft Internet Information Services (IIS) 5.1 on Windows XP Professional SP2 allows remote attackers to execute arbitrary code via multiple requests to ".dll" followed by arguments such as "~0" through "~9", which causes ntdll.dll to produce a return value that is not correctly handled by IIS, as demonstrated using "/_vti_bin/.dll/*/~0". NOTE: the consequence was originally believed to be only a denial of service (application crash and reboot). | ||||||||
family | windows | ||||||||
id | oval:org.mitre.oval:def:1703 | ||||||||
status | accepted | ||||||||
submitted | 2007-07-10T18:34:24 | ||||||||
title | IIS Memory Request Vulnerability | ||||||||
version | 37 |
References
- http://ingehenriksen.blogspot.com/2005/12/microsoft-iis-remote-dos-dll-url.html
- http://secunia.com/advisories/18106
- http://www.securityfocus.com/bid/15921
- http://securitytracker.com/alerts/2005/Dec/1015376.html
- http://www.osvdb.org/21805
- http://archive.cert.uni-stuttgart.de/bugtraq/2007/07/msg00254.html
- http://www.us-cert.gov/cas/techalerts/TA07-191A.html
- http://securityreason.com/securityalert/271
- http://www.vupen.com/english/advisories/2005/2963
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1703
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-041
- http://www.securityfocus.com/archive/1/419707/100/0/threaded