CERTA-2003-AVI-092
Vulnerability from certfr_avis - Published: - Updated:
Microsoft a publié un correctif cumulatif pour Internet Information Server (IIS).
Description
Ce correctif concerne des vulnérabilités présentes dans plusieurs versions de Microsoft Internet Information Server, permettant à un utilisateur distant mal intentionné d'exécuter du code arbitraire, d'effectuer des dénis de service ou bien d'exploiter des vulnérabilités de type "Cross Site Scripting" (cf. bulletin d'information CERTA-2002-INF-001).
Solution
Se référer au bulletin de sécurité Microsoft (section Documentation) afin d'obtenir la liste des correctifs.
- Microsoft Internet Information Server 4.0 ;
- Microsoft Internet Information Server 5.0 ;
- Microsoft Internet Information Server 5.1.
Nota : La version 6.0 n'est pas concerné par ce correctif.
Impacted products
| Vendor | Product | Description |
|---|
References
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cUL\u003e \u003cLI\u003eMicrosoft Internet Information Server 4.0 ;\u003c/LI\u003e \u003cLI\u003eMicrosoft Internet Information Server 5.0 ;\u003c/LI\u003e \u003cLI\u003eMicrosoft Internet Information Server 5.1.\u003c/LI\u003e \u003c/UL\u003e \u003cP\u003eNota : La version 6.0 n\u0027est pas concern\u00e9 par ce correctif.\u003c/P\u003e",
"content": "## Description\n\nCe correctif concerne des vuln\u00e9rabilit\u00e9s pr\u00e9sentes dans plusieurs\nversions de Microsoft Internet Information Server, permettant \u00e0 un\nutilisateur distant mal intentionn\u00e9 d\u0027ex\u00e9cuter du code arbitraire,\nd\u0027effectuer des d\u00e9nis de service ou bien d\u0027exploiter des vuln\u00e9rabilit\u00e9s\nde type \"Cross Site Scripting\" (cf. bulletin d\u0027information\nCERTA-2002-INF-001).\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 Microsoft (section Documentation)\nafin d\u0027obtenir la liste des correctifs.\n",
"cves": [],
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 MS03-018 :",
"url": "http://www.microsoft.com/technet/security/bulletin/MS03-018.asp"
}
],
"reference": "CERTA-2003-AVI-092",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2003-05-30T00:00:00.000000"
}
],
"risks": [
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "D\u00e9ni de service"
}
],
"summary": "Microsoft a publi\u00e9 un correctif cumulatif pour Internet Information\nServer (IIS).\n",
"title": "Correctif cumulatif pour Internet Information Server",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin Microsoft MS03-018",
"url": null
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…