ID CVE-2002-1142
Summary Heap-based buffer overflow in the Remote Data Services (RDS) component of Microsoft Data Access Components (MDAC) 2.1 through 2.6, and Internet Explorer 5.01 through 6.0, allows remote attackers to execute code via a malformed HTTP request to the Data Stub.
References
Vulnerable Configurations
  • Microsoft MDAC 2.1
    cpe:2.3:a:microsoft:data_access_components:2.1
  • Microsoft data_access_components 2.5
    cpe:2.3:a:microsoft:data_access_components:2.5
  • Microsoft data_access_components 2.6
    cpe:2.3:a:microsoft:data_access_components:2.6
  • Microsoft Internet Explorer 5.0.1
    cpe:2.3:a:microsoft:ie:5.0.1
  • Microsoft Internet Explorer 5.0.1 SP1
    cpe:2.3:a:microsoft:ie:5.0.1:sp1
  • Microsoft Internet Explorer 5.0.1 SP2
    cpe:2.3:a:microsoft:ie:5.0.1:sp2
  • Microsoft ie 5.5
    cpe:2.3:a:microsoft:ie:5.5
  • Microsoft Internet Explorer 5.5 SP1
    cpe:2.3:a:microsoft:ie:5.5:sp1
  • Microsoft Internet Explorer 5.5 SP2
    cpe:2.3:a:microsoft:ie:5.5:sp2
  • Microsoft Internet Explorer 6.0
    cpe:2.3:a:microsoft:ie:6.0
  • cpe:2.3:a:microsoft:ie:6.0:sp1
    cpe:2.3:a:microsoft:ie:6.0:sp1
CVSS
Base: 7.5 (as of 01-01-2004 - 00:00)
Impact:
Exploitability:
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
exploit-db via4
description Microsoft IIS MDAC msadcs.dll RDS DataStub Content-Type Overflow. CVE-2002-1142. Remote exploit for windows platform
id EDB-ID:19026
last seen 2016-02-02
modified 2012-06-08
published 2012-06-08
reporter metasploit
source https://www.exploit-db.com/download/19026/
title Microsoft IIS MDAC msadcs.dll RDS DataStub Content-Type Overflow
metasploit via4
description This module can be used to execute arbitrary code on IIS servers that expose the /msadc/msadcs.dll Microsoft Data Access Components (MDAC) Remote Data Service (RDS) DataFactory service. The service is exploitable even when RDS is configured to deny remote connections (handsafe.reg). The service is vulnerable to a heap overflow where the RDS DataStub 'Content-Type' string is overly long. Microsoft Data Access Components (MDAC) 2.1 through 2.6 are known to be vulnerable.
id MSF:EXPLOIT/WINDOWS/IIS/MS02_065_MSADC
last seen 2018-02-01
modified 2017-11-08
published 2012-06-07
reliability Normal
reporter Rapid7
source https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/iis/ms02_065_msadc.rb
title MS02-065 Microsoft IIS MDAC msadcs.dll RDS DataStub Content-Type Overflow
nessus via4
NASL family Web Servers
NASL id MSADCS_OVERFLOW.NASL
description The remote DLL /msadc/msadcs.dll is accessible by anyone. Several flaws have been found in it in the past. We recommend that you restrict access to MSADC only to trusted hosts.
last seen 2019-02-21
modified 2018-11-15
plugin id 11161
published 2002-11-22
reporter Tenable
source https://www.tenable.com/plugins/index.php?view=single&id=11161
title Microsoft Data Access Components RDS Data Stub Remote Overflow
oval via4
  • accepted 2008-05-05T04:00:18.440-04:00
    class vulnerability
    contributors
    • name Ingrid Skoog
      organization The MITRE Corporation
    • name Andrew Buttner
      organization The MITRE Corporation
    • name Robert L. Hollis
      organization ThreatGuard, Inc.
    • name Jeff Cheng
      organization Opsware, Inc.
    • name Clifford Farrugia
      organization GFI Software
    description Heap-based buffer overflow in the Remote Data Services (RDS) component of Microsoft Data Access Components (MDAC) 2.1 through 2.6, and Internet Explorer 5.01 through 6.0, allows remote attackers to execute code via a malformed HTTP request to the Data Stub.
    family windows
    id oval:org.mitre.oval:def:2730
    status accepted
    submitted 2004-08-24T12:00:00.000-04:00
    title Microsoft Data Access Components 2.5 Remote Data Services Buffer Overflow
    version 9
  • accepted 2008-05-05T04:00:19.709-04:00
    class vulnerability
    contributors
    • name Ingrid Skoog
      organization The MITRE Corporation
    • name Andrew Buttner
      organization The MITRE Corporation
    • name Robert L. Hollis
      organization ThreatGuard, Inc.
    • name Jeff Cheng
      organization Opsware, Inc.
    • name Clifford Farrugia
      organization GFI Software
    description Heap-based buffer overflow in the Remote Data Services (RDS) component of Microsoft Data Access Components (MDAC) 2.1 through 2.6, and Internet Explorer 5.01 through 6.0, allows remote attackers to execute code via a malformed HTTP request to the Data Stub.
    family windows
    id oval:org.mitre.oval:def:294
    status accepted
    submitted 2004-08-24T12:00:00.000-04:00
    title Microsoft Data Access Components 2.6 Remote Data Services Buffer Overflow
    version 9
  • accepted 2008-05-05T04:00:20.879-04:00
    class vulnerability
    contributors
    • name Ingrid Skoog
      organization The MITRE Corporation
    • name Andrew Buttner
      organization The MITRE Corporation
    • name Robert L. Hollis
      organization ThreatGuard, Inc.
    • name Jeff Cheng
      organization Opsware, Inc.
    • name Clifford Farrugia
      organization GFI Software
    description Heap-based buffer overflow in the Remote Data Services (RDS) component of Microsoft Data Access Components (MDAC) 2.1 through 2.6, and Internet Explorer 5.01 through 6.0, allows remote attackers to execute code via a malformed HTTP request to the Data Stub.
    family windows
    id oval:org.mitre.oval:def:3573
    status accepted
    submitted 2004-08-24T12:00:00.000-04:00
    title Microsoft Data Access Components 2.1 Remote Data Services Buffer Overflow
    version 9
packetstorm via4
data source https://packetstormsecurity.com/files/download/113354/ms02_065_msadc.rb.txt
id PACKETSTORM:113354
last seen 2016-12-05
published 2012-06-07
reporter patrick
source https://packetstormsecurity.com/files/113354/Microsoft-IIS-MDAC-msadcs.dll-RDS-DataStub-Content-Type-Overflow.html
title Microsoft IIS MDAC msadcs.dll RDS DataStub Content-Type Overflow
refmap via4
bid 6214
cert CA-2002-33
cert-vn VU#542081
misc http://www.foundstone.com/knowledge/randd-advisories-display.html?id=337
ms MS02-065
vulnwatch 20021120 Foundstone Advisory
xf
  • mdac-rds-client-bo(10669)
  • mdac-rds-server-bo(10659)
Last major update 10-09-2008 - 15:13
Published 29-11-2002 - 00:00
Last modified 12-10-2018 - 17:31
Back to Top