var-200207-0023
Vulnerability from variot
Buffer overflow in the chunked encoding transfer mechanism in IIS 4.0 and 5.0 allows attackers to execute arbitrary code via the processing of HTR request sessions, aka "Heap Overrun in HTR Chunked Encoding Could Enable Web Server Compromise.". This condition affects IIS 4.0 and IIS 5.0. Exploitation of this vulnerability may result in a denial of service or allow for a remote attacker to execute arbitrary instructions on the victim host
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-200207-0023", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "internet information server", "scope": "eq", "trust": 1.6, "vendor": "microsoft", "version": "4.0" }, { "model": "internet information services", "scope": "eq", "trust": 1.6, "vendor": "microsoft", "version": "5.0" }, { "model": null, "scope": null, "trust": 0.8, "vendor": "microsoft", "version": null }, { "model": "iis", "scope": "eq", "trust": 0.8, "vendor": "microsoft", "version": "4.0" }, { "model": "iis", "scope": "eq", "trust": 0.8, "vendor": "microsoft", "version": "5.0" }, { "model": "internet information server", "scope": "eq", "trust": 0.6, "vendor": "microsoft", "version": "5.0" }, { "model": "windows nt workstation sp6a", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "4.0" }, { "model": "windows nt workstation sp6", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "4.0" }, { "model": "windows nt workstation sp5", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "4.0" }, { "model": "windows nt workstation sp4", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "4.0" }, { "model": "windows nt workstation sp3", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "4.0" }, { "model": "windows nt workstation sp2", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "4.0" }, { "model": "windows nt workstation sp1", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "4.0" }, { "model": "windows nt workstation", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "4.0" }, { "model": "windows nt terminal server sp6", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "4.0" }, { "model": "windows nt terminal server sp5", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "4.0" }, { "model": "windows nt terminal server sp4", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "4.0" }, { "model": "windows nt terminal server sp3", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "4.0" }, { "model": "windows nt terminal server sp2", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "4.0" }, { "model": "windows nt terminal server sp1", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "4.0" }, { "model": "windows nt terminal server", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "4.0" }, { "model": "windows nt server sp6a", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "4.0" }, { "model": "windows nt server sp6", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "4.0" }, { "model": "windows nt server sp5", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "4.0" }, { "model": "windows nt server sp4", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "4.0" }, { "model": "windows nt server sp3", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "4.0" }, { "model": "windows nt server sp2", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "4.0" }, { "model": "windows nt server sp1", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "4.0" }, { "model": "windows nt server", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "4.0" }, { "model": "windows nt enterprise server sp6a", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "4.0" }, { "model": "windows nt enterprise server sp6", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "4.0" }, { "model": "windows nt enterprise server sp5", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "4.0" }, { "model": "windows nt enterprise server sp4", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "4.0" }, { "model": "windows nt enterprise server sp3", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "4.0" }, { "model": "windows nt enterprise server sp2", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "4.0" }, { "model": "windows nt enterprise server sp1", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "4.0" }, { "model": "windows nt enterprise server", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "4.0" }, { "model": "windows server sp2", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2000" }, { "model": "windows server sp1", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2000" }, { "model": "windows server", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2000" }, { "model": "windows professional sp2", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2000" }, { "model": "windows professional sp1", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2000" }, { "model": "windows professional", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2000" }, { "model": "windows datacenter server sp2", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2000" }, { "model": "windows datacenter server sp1", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2000" }, { "model": "windows datacenter server", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2000" }, { "model": "windows advanced server sp2", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2000" }, { "model": "windows advanced server sp1", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2000" }, { "model": "windows advanced server", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2000" }, { "model": "windows server sp3", "scope": "ne", "trust": 0.3, "vendor": "microsoft", "version": "2000" }, { "model": "windows professional sp3", "scope": "ne", "trust": 0.3, "vendor": "microsoft", "version": "2000" }, { "model": "windows datacenter server sp3", "scope": "ne", "trust": 0.3, "vendor": "microsoft", "version": "2000" }, { "model": "windows advanced server sp3", "scope": "ne", "trust": 0.3, "vendor": "microsoft", "version": "2000" } ], "sources": [ { "db": "CERT/CC", "id": "VU#313819" }, { "db": "BID", "id": "4855" }, { "db": "JVNDB", "id": "JVNDB-2002-000101" }, { "db": "CNNVD", "id": "CNNVD-200207-013" }, { "db": "NVD", "id": "CVE-2002-0364" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:microsoft:iis", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2002-000101" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Next Generation Security Software", "sources": [ { "db": "CNNVD", "id": "CNNVD-200207-013" } ], "trust": 0.6 }, "cve": "CVE-2002-0364", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2002-0364", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2002-0364", "trust": 1.0, "value": "HIGH" }, { "author": "CARNEGIE MELLON", "id": "VU#313819", "trust": 0.8, "value": "15.69" }, { "author": "NVD", "id": "CVE-2002-0364", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-200207-013", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "CERT/CC", "id": "VU#313819" }, { "db": "JVNDB", "id": "JVNDB-2002-000101" }, { "db": "CNNVD", "id": "CNNVD-200207-013" }, { "db": "NVD", "id": "CVE-2002-0364" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Buffer overflow in the chunked encoding transfer mechanism in IIS 4.0 and 5.0 allows attackers to execute arbitrary code via the processing of HTR request sessions, aka \"Heap Overrun in HTR Chunked Encoding Could Enable Web Server Compromise.\". \nThis condition affects IIS 4.0 and IIS 5.0. Exploitation of this vulnerability may result in a denial of service or allow for a remote attacker to execute arbitrary instructions on the victim host", "sources": [ { "db": "NVD", "id": "CVE-2002-0364" }, { "db": "CERT/CC", "id": "VU#313819" }, { "db": "JVNDB", "id": "JVNDB-2002-000101" }, { "db": "BID", "id": "4855" } ], "trust": 2.61 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "BID", "id": "4855", "trust": 2.7 }, { "db": "CERT/CC", "id": "VU#313819", "trust": 2.4 }, { "db": "NVD", "id": "CVE-2002-0364", "trust": 2.4 }, { "db": "JVNDB", "id": "JVNDB-2002-000101", "trust": 0.8 }, { "db": "OVAL", "id": "OVAL:ORG.MITRE.OVAL:DEF:182", "trust": 0.6 }, { "db": "OVAL", "id": "OVAL:ORG.MITRE.OVAL:DEF:29", "trust": 0.6 }, { "db": "BUGTRAQ", "id": "20020612 ADVISORY: WINDOWS 2000 AND NT4 IIS .HTR REMOTE BUFFER OVERFLOW [AD20020612]", "trust": 0.6 }, { "db": "BUGTRAQ", "id": "20020613 VNA - .HTR HEAP OVERFLOW", "trust": 0.6 }, { "db": "MS", "id": "MS02-028", "trust": 0.6 }, { "db": "NTBUGTRAQ", "id": "20020612 ADVISORY: WINDOWS 2000 AND NT4 IIS .HTR REMOTE BUFFER OVERFLOW", "trust": 0.6 }, { "db": "VULNWATCH", "id": "20020612 ADVISORY: WINDOWS 2000 AND NT4 IIS .HTR REMOTE BUFFER OVERFLOW [AD20020612]", "trust": 0.6 }, { "db": "XF", "id": "9327", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-200207-013", "trust": 0.6 } ], "sources": [ { "db": "CERT/CC", "id": "VU#313819" }, { "db": "BID", "id": "4855" }, { "db": "JVNDB", "id": "JVNDB-2002-000101" }, { "db": "CNNVD", "id": "CNNVD-200207-013" }, { "db": "NVD", "id": "CVE-2002-0364" } ] }, "id": "VAR-200207-0023", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 1.0 }, "last_update_date": "2024-11-22T22:51:39.503000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "MS02-028", "trust": 0.8, "url": "http://www.microsoft.com/technet/security/bulletin/ms02-028.asp" }, { "title": "MS02-028", "trust": 0.8, "url": "http://www.microsoft.com/japan/technet/security/Bulletin/ms02-028.mspx" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2002-000101" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-Other", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2002-0364" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.4, "url": "http://www.securityfocus.com/bid/4855" }, { "trust": 2.6, "url": "http://www.kb.cert.org/vuls/id/313819" }, { "trust": 2.6, "url": "http://www.iss.net/security_center/static/9327.php" }, { "trust": 2.6, "url": "http://online.securityfocus.com/archive/1/276767" }, { "trust": 2.6, "url": "http://archives.neohapsis.com/archives/vulnwatch/2002-q2/0099.html" }, { "trust": 2.0, "url": "http://marc.info/?l=bugtraq\u0026m=102392069305962\u0026w=2" }, { "trust": 2.0, "url": "http://marc.info/?l=ntbugtraq\u0026m=102392308608100\u0026w=2" }, { "trust": 2.0, "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2002/ms02-028" }, { "trust": 2.0, "url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a182" }, { "trust": 2.0, "url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a29" }, { "trust": 0.8, "url": "about vulnerability notes" }, { "trust": 0.8, "url": "contact us about this vulnerability" }, { "trust": 0.8, "url": "provide a vendor statement" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2002-0364" }, { "trust": 0.8, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2002-0364" }, { "trust": 0.6, "url": "http://www.microsoft.com/technet/security/bulletin/ms02-028.asp" }, { "trust": 0.6, "url": "http://marc.theaimsgroup.com/?l=bugtraq\u0026m=102392069305962\u0026w=2" }, { "trust": 0.6, "url": "http://marc.theaimsgroup.com/?l=ntbugtraq\u0026m=102392308608100\u0026w=2" }, { "trust": 0.6, "url": "http://oval.mitre.org/repository/data/getdef?id=oval:org.mitre.oval:def:29" }, { "trust": 0.6, "url": "http://oval.mitre.org/repository/data/getdef?id=oval:org.mitre.oval:def:182" }, { "trust": 0.3, "url": "http://support.coresecurity.com/impact/exploits/6173c344069de8bf65e060cf3e1ea6fa.html" }, { "trust": 0.3, "url": "http://www.nextgenss.com/vna/ms-iishtr.txt" }, { "trust": 0.3, "url": "http://www.microsoft.com/technet/treeview/default.asp?url=/technet/security/bulletin/ms02-028.asp" }, { "trust": 0.3, "url": "http://www.microsoft.com/technet/security/advisory/default.mspx" } ], "sources": [ { "db": "CERT/CC", "id": "VU#313819" }, { "db": "BID", "id": "4855" }, { "db": "JVNDB", "id": "JVNDB-2002-000101" }, { "db": "CNNVD", "id": "CNNVD-200207-013" }, { "db": "NVD", "id": "CVE-2002-0364" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CERT/CC", "id": "VU#313819" }, { "db": "BID", "id": "4855" }, { "db": "JVNDB", "id": "JVNDB-2002-000101" }, { "db": "CNNVD", "id": "CNNVD-200207-013" }, { "db": "NVD", "id": "CVE-2002-0364" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2002-06-13T00:00:00", "db": "CERT/CC", "id": "VU#313819" }, { "date": "2002-05-27T00:00:00", "db": "BID", "id": "4855" }, { "date": "2007-04-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2002-000101" }, { "date": "2002-05-27T00:00:00", "db": "CNNVD", "id": "CNNVD-200207-013" }, { "date": "2002-07-03T04:00:00", "db": "NVD", "id": "CVE-2002-0364" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2004-02-23T00:00:00", "db": "CERT/CC", "id": "VU#313819" }, { "date": "2002-05-27T00:00:00", "db": "BID", "id": "4855" }, { "date": "2007-04-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2002-000101" }, { "date": "2005-10-12T00:00:00", "db": "CNNVD", "id": "CNNVD-200207-013" }, { "date": "2024-11-20T23:38:54.473000", "db": "NVD", "id": "CVE-2002-0364" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-200207-013" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Microsoft Internet Information Server (IIS) contains remote buffer overflow in chunked encoding data transfer mechanism for HTR", "sources": [ { "db": "CERT/CC", "id": "VU#313819" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Boundary Condition Error", "sources": [ { "db": "BID", "id": "4855" }, { "db": "CNNVD", "id": "CNNVD-200207-013" } ], "trust": 0.9 } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…