CERTA-2004-AVI-365
Vulnerability from certfr_avis
Une vulnérabilité découverte dans les systèmes affectés de Microsoft permet à un utilisateur mal intentionné d'usurper l'adresse réticulaire (URL) d'un site web.
Description
Les produits ISA Server 2000 et Proxy Server 2.0 enregistrent dans un cache les réponses des réquêtes DNS inverse, et utilisent ce cache pour résoudre les requêtes DNS. Une personne mal intentionnée peut, par le biais d'une requête DNS inverse malicieusement construite, polluer le cache en vue de duper un internaute en lui faisant croire qu'il accède à un site web de confiance tandis qu'il sera dirigé vers un site web malicieux.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. Documentation).
NoneImpacted products
Vendor | Product | Description | ||
---|---|---|---|---|
ESET | Internet Security | Microsoft Internet Security and Acceleration Server 2000 Service Pack 1 & 2 ; | ||
Microsoft | N/A | Microsoft Proxy Server 2.0 Service Pack 1 ; | ||
Cisco | Small Business | Microsoft Small Business Server 2000 ; | ||
Cisco | Small Business | Microsoft Small Business Server 2003 Premium Edition. |
References
Title | Publication Time | Tags | |||
---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "Microsoft Internet Security and Acceleration Server 2000 Service Pack 1 \u0026 2 ;", "product": { "name": "Internet Security", "vendor": { "name": "ESET", "scada": false } } }, { "description": "Microsoft Proxy Server 2.0 Service Pack 1 ;", "product": { "name": "N/A", "vendor": { "name": "Microsoft", "scada": false } } }, { "description": "Microsoft Small Business Server 2000 ;", "product": { "name": "Small Business", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "Microsoft Small Business Server 2003 Premium Edition.", "product": { "name": "Small Business", "vendor": { "name": "Cisco", "scada": false } } } ], "affected_systems_content": null, "content": "## Description\n\nLes produits ISA Server 2000 et Proxy Server 2.0 enregistrent dans un\ncache les r\u00e9ponses des r\u00e9qu\u00eates DNS inverse, et utilisent ce cache pour\nr\u00e9soudre les requ\u00eates DNS. Une personne mal intentionn\u00e9e peut, par le\nbiais d\u0027une requ\u00eate DNS inverse malicieusement construite, polluer le\ncache en vue de duper un internaute en lui faisant croire qu\u0027il acc\u00e8de \u00e0\nun site web de confiance tandis qu\u0027il sera dirig\u00e9 vers un site web\nmalicieux.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. Documentation).\n", "cves": [], "initial_release_date": "2004-11-10T00:00:00", "last_revision_date": "2004-11-10T00:00:00", "links": [], "reference": "CERTA-2004-AVI-365", "revisions": [ { "description": "version initiale.", "revision_date": "2004-11-10T00:00:00.000000" } ], "risks": [ { "description": "Usurpation d\u0027adresse r\u00e9ticulaire (url)" } ], "summary": "Une vuln\u00e9rabilit\u00e9 d\u00e9couverte dans les syst\u00e8mes affect\u00e9s de Microsoft\npermet \u00e0 un utilisateur mal intentionn\u00e9 d\u0027usurper l\u0027adresse r\u00e9ticulaire\n(URL) d\u0027un site web.\n", "title": "Vuln\u00e9rabilit\u00e9 dans ISA Server / Proxy Server", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Microsoft MS04-039", "url": "http://www.microsoft.com/technet/security/bulletin/MS04-039.mspx" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…