Vulnerabilities > CVE-2006-0026 - Unspecified vulnerability in Microsoft products

047910
CVSS 6.5 - MEDIUM
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
SINGLE
Confidentiality impact
PARTIAL
Integrity impact
PARTIAL
Availability impact
PARTIAL
network
low complexity
microsoft
nessus
exploit available

Summary

Buffer overflow in Microsoft Internet Information Services (IIS) 5.0, 5.1, and 6.0 allows local and possibly remote attackers to execute arbitrary code via crafted Active Server Pages (ASP).

Vulnerable Configurations

Part Description Count
Application
Microsoft
2

Exploit-Db

descriptionMicrosoft IIS ASP Stack Overflow Exploit (MS06-034). CVE-2006-0026. Local exploit for windows platform
idEDB-ID:2056
last seen2016-01-31
modified2006-07-21
published2006-07-21
reportercocoruder
sourcehttps://www.exploit-db.com/download/2056/
titleMicrosoft IIS ASP - Stack Overflow Exploit MS06-034

Nessus

NASL familyWindows : Microsoft Bulletins
NASL idSMB_NT_MS06-034.NASL
descriptionThe remote host is running a version of Windows and IIS that is vulnerable to a flaw that could allow an attacker who has the privileges to upload arbitrary ASP scripts to it to execute arbitrary code. Specifically, the remote version of IIS is vulnerable to a flaw when parsing specially crafted ASP files. By uploading a malicious ASP file on the remote host, an attacker may be able to take the complete control of the remote system.
last seen2020-06-01
modified2020-06-02
plugin id22028
published2006-07-11
reporterThis script is Copyright (C) 2006-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/22028
titleMS06-034: Vulnerability in Microsoft IIS using ASP Could Allow Remote Code Execution (917537)
code
#
# Tenable Network Security, Inc.
#

include("compat.inc");

if (description)
{
 script_id(22028);
 script_version("1.31");
 script_cvs_date("Date: 2018/11/15 20:50:30");

 script_cve_id("CVE-2006-0026");
 script_bugtraq_id(18858);
 script_xref(name:"CERT", value:"395588");
 script_xref(name:"MSFT", value:"MS06-034");
 script_xref(name:"MSKB", value:"917537");

 script_name(english:"MS06-034: Vulnerability in Microsoft IIS using ASP Could Allow Remote Code Execution (917537)");
 script_summary(english:"Determines if hotfix 917537 has been installed");

 script_set_attribute(attribute:"synopsis", value:
"It is possible to use the remote web server to exploit arbitrary code on the
remote host.");
 script_set_attribute(attribute:"description", value:
"The remote host is running a version of Windows and IIS that is
vulnerable to a flaw that could allow an attacker who has the
privileges to upload arbitrary ASP scripts to it to execute arbitrary
code.

Specifically, the remote version of IIS is vulnerable to a flaw when
parsing specially crafted ASP files.  By uploading a malicious ASP file
on the remote host, an attacker may be able to take the complete control
of the remote system.");
 script_set_attribute(attribute:"see_also", value:"https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2006/ms06-034");
 script_set_attribute(attribute:"solution", value:
"Microsoft has released a set of patches for Windows 2000, XP and
2003.");
 script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:S/C:P/I:P/A:P");
 script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
 script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
 script_set_attribute(attribute:"exploit_available", value:"true");

 script_set_attribute(attribute:"vuln_publication_date", value:"2006/07/11");
 script_set_attribute(attribute:"patch_publication_date", value:"2006/07/11");
 script_set_attribute(attribute:"plugin_publication_date", value:"2006/07/11");

 script_set_attribute(attribute:"plugin_type", value:"local");
 script_set_attribute(attribute:"cpe", value:"cpe:/o:microsoft:windows");
 script_end_attributes();

 script_category(ACT_GATHER_INFO);

 script_copyright(english:"This script is Copyright (C) 2006-2018 Tenable Network Security, Inc.");
 script_family(english:"Windows : Microsoft Bulletins");

 script_dependencies("smb_hotfixes.nasl", "ms_bulletin_checks_possible.nasl");
 script_require_keys("SMB/MS_Bulletin_Checks/Possible");
 script_require_ports(139, 445, 'Host/patch_management_checks');
 exit(0);
}

include("audit.inc");
include("smb_func.inc");
include("smb_hotfixes.inc");
include("smb_hotfixes_fcheck.inc");
include("misc_func.inc");

get_kb_item_or_exit("SMB/MS_Bulletin_Checks/Possible");

bulletin = 'MS06-034';
kb = '917537';

kbs = make_list(kb);
if (get_kb_item("Host/patch_management_checks")) hotfix_check_3rd_party(bulletin:bulletin, kbs:kbs, severity:SECURITY_WARNING);

get_kb_item_or_exit("SMB/Registry/Enumerated");
get_kb_item_or_exit("SMB/WindowsVersion", exit_code:1);

if (hotfix_check_sp_range(win2k:'4,5', xp:'1,2', win2003:'0,1') <= 0) audit(AUDIT_OS_SP_NOT_VULN);

rootfile = hotfix_get_systemroot();
if (!rootfile) exit(1, "Failed to get the system root.");

share = hotfix_path2share(path:rootfile);
if (!is_accessible_share(share:share)) audit(AUDIT_SHARE_FAIL, share);

if ( hotfix_is_vulnerable(os:"5.2", sp:1, file:"asp.dll", version:"6.0.3790.2684", dir:"\system32\inetsrv", bulletin:bulletin, kb:kb) ||
     hotfix_is_vulnerable(os:"5.2", sp:0, file:"asp.dll", version:"6.0.3790.520", dir:"\system32\inetsrv", bulletin:bulletin, kb:kb) ||
     hotfix_is_vulnerable(os:"5.1", sp:2, file:"asp.dll", version:"5.1.2600.2889", dir:"\system32\inetsrv", bulletin:bulletin, kb:kb) ||
     hotfix_is_vulnerable(os:"5.1", sp:1, file:"asp.dll", version:"5.1.2600.1829", dir:"\system32\inetsrv", bulletin:bulletin, kb:kb) ||
     hotfix_is_vulnerable(os:"5.0", file:"asp.dll", version:"5.0.2195.7084", dir:"\system32\inetsrv", bulletin:bulletin, kb:kb) )
{
  set_kb_item(name:"SMB/Missing/"+bulletin, value:TRUE);
  hotfix_security_warning();

  hotfix_check_fversion_end();
  exit(0);
}
else
{
  hotfix_check_fversion_end();
  audit(AUDIT_HOST_NOT, 'affected');
}

Oval

accepted2008-02-25T04:00:08.981-05:00
classvulnerability
contributors
  • nameRobert L. Hollis
    organizationThreatGuard, Inc.
  • nameKen Lassesen
    organizationLumension Security, Inc.
definition_extensions
  • commentMicrosoft Windows 2000 SP4 or later is installed
    ovaloval:org.mitre.oval:def:229
  • commentMicrosoft IIS 5.0 is installed
    ovaloval:org.mitre.oval:def:731
  • commentMicrosoft Windows XP SP1 (32-bit) is installed
    ovaloval:org.mitre.oval:def:1
  • commentMicrosoft IIS 5.1 is installed
    ovaloval:org.mitre.oval:def:460
  • commentMicrosoft Windows XP SP2 or later is installed
    ovaloval:org.mitre.oval:def:521
  • commentMicrosoft IIS 5.1 is installed
    ovaloval:org.mitre.oval:def:460
  • commentMicrosoft Windows XP SP1 (64-bit) is installed
    ovaloval:org.mitre.oval:def:480
  • commentMicrosoft IIS 6.0 is installed
    ovaloval:org.mitre.oval:def:227
  • commentMicrosoft Windows Server 2003 (x86) Gold is installed
    ovaloval:org.mitre.oval:def:165
  • commentMicrosoft IIS 6.0 is installed
    ovaloval:org.mitre.oval:def:227
  • commentMicrosoft Windows Server 2003 SP1 (x86) is installed
    ovaloval:org.mitre.oval:def:565
  • commentMicrosoft IIS 6.0 is installed
    ovaloval:org.mitre.oval:def:227
descriptionBuffer overflow in Microsoft Internet Information Services (IIS) 5.0, 5.1, and 6.0 allows local and possibly remote attackers to execute arbitrary code via crafted Active Server Pages (ASP).
familywindows
idoval:org.mitre.oval:def:435
statusaccepted
submitted2006-07-25T12:05:33
titleInternet Information Services using Malformed Active Server Pages Vulnerability
version37