var-200003-0003
Vulnerability from variot
IIS 4.0 allows attackers to cause a denial of service by requesting a large buffer in a POST or PUT command which consumes memory, aka the "Chunked Transfer Encoding Buffer Overflow Vulnerability.". Microsoft IIS 4.0, circa March 2000, contained a vulnerability that allowed an intruder to consume unlimited memory on a vulnerable server. Due to unchecked buffer code that handles chunked encoding transfers, remote users are able to consume CPU cycles in Microsoft IIS until the program is rendered completely unstable and eventually crash. This can cause the server to hang indefinitely until the remote user cancels the session or until the IIS service is stopped and restarted
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-200003-0003", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "internet information server", "scope": "eq", "trust": 1.6, "vendor": "microsoft", "version": "4.0" }, { "model": "iis", "scope": "eq", "trust": 1.1, "vendor": "microsoft", "version": "4.0" }, { "model": null, "scope": null, "trust": 0.8, "vendor": "microsoft", "version": null }, { "model": "iis alpha", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "4.0" } ], "sources": [ { "db": "CERT/CC", "id": "VU#25716" }, { "db": "BID", "id": "1066" }, { "db": "JVNDB", "id": "JVNDB-2000-000015" }, { "db": "CNNVD", "id": "CNNVD-200003-037" }, { "db": "NVD", "id": "CVE-2000-0226" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:microsoft:iis", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2000-000015" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Discovered by Petteri Stenius and publicized in Microsoft Security Bulletin (MS00-018) released on March 20, 2000.", "sources": [ { "db": "BID", "id": "1066" }, { "db": "CNNVD", "id": "CNNVD-200003-037" } ], "trust": 0.9 }, "cve": "CVE-2000-0226", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2000-0226", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2000-0226", "trust": 1.0, "value": "MEDIUM" }, { "author": "CARNEGIE MELLON", "id": "VU#25716", "trust": 0.8, "value": "2.62" }, { "author": "NVD", "id": "CVE-2000-0226", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-200003-037", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CERT/CC", "id": "VU#25716" }, { "db": "JVNDB", "id": "JVNDB-2000-000015" }, { "db": "CNNVD", "id": "CNNVD-200003-037" }, { "db": "NVD", "id": "CVE-2000-0226" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "IIS 4.0 allows attackers to cause a denial of service by requesting a large buffer in a POST or PUT command which consumes memory, aka the \"Chunked Transfer Encoding Buffer Overflow Vulnerability.\". Microsoft IIS 4.0, circa March 2000, contained a vulnerability that allowed an intruder to consume unlimited memory on a vulnerable server. Due to unchecked buffer code that handles chunked encoding transfers, remote users are able to consume CPU cycles in Microsoft IIS until the program is rendered completely unstable and eventually crash. This can cause the server to hang indefinitely until the remote user cancels the session or until the IIS service is stopped and restarted", "sources": [ { "db": "NVD", "id": "CVE-2000-0226" }, { "db": "CERT/CC", "id": "VU#25716" }, { "db": "JVNDB", "id": "JVNDB-2000-000015" }, { "db": "BID", "id": "1066" } ], "trust": 2.61 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "BID", "id": "1066", "trust": 3.5 }, { "db": "NVD", "id": "CVE-2000-0226", "trust": 2.4 }, { "db": "CERT/CC", "id": "VU#25716", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2000-000015", "trust": 0.8 }, { "db": "MS", "id": "MS00-018", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-200003-037", "trust": 0.6 } ], "sources": [ { "db": "CERT/CC", "id": "VU#25716" }, { "db": "BID", "id": "1066" }, { "db": "JVNDB", "id": "JVNDB-2000-000015" }, { "db": "CNNVD", "id": "CNNVD-200003-037" }, { "db": "NVD", "id": "CVE-2000-0226" } ] }, "id": "VAR-200003-0003", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 1.0 }, "last_update_date": "2024-11-22T22:57:22.617000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "MS00-018", "trust": 0.8, "url": "http://www.microsoft.com/technet/security/bulletin/ms00-018.asp" }, { "title": "MS00-018", "trust": 0.8, "url": "http://www.microsoft.com/japan/technet/security/Bulletin/ms00-018.mspx" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2000-000015" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-Other", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2000-0226" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.4, "url": "http://www.securityfocus.com/bid/1066" }, { "trust": 2.0, "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-018" }, { "trust": 1.4, "url": "http://www.microsoft.com/technet/security/bulletin/ms00-018.asp" }, { "trust": 1.1, "url": "http://www.microsoft.com/technet/security/bulletin/fq00-018.asp" }, { "trust": 1.1, "url": "http://www.microsoft.com/technet/support/kb.asp?id=252693" }, { "trust": 0.8, "url": "http://www.ietf.org/rfc/rfc2616.txt" }, { "trust": 0.8, "url": "http://online.securityfocus.com/bid/1066" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2000-0226" }, { "trust": 0.8, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2000-0226" } ], "sources": [ { "db": "CERT/CC", "id": "VU#25716" }, { "db": "BID", "id": "1066" }, { "db": "JVNDB", "id": "JVNDB-2000-000015" }, { "db": "CNNVD", "id": "CNNVD-200003-037" }, { "db": "NVD", "id": "CVE-2000-0226" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CERT/CC", "id": "VU#25716" }, { "db": "BID", "id": "1066" }, { "db": "JVNDB", "id": "JVNDB-2000-000015" }, { "db": "CNNVD", "id": "CNNVD-200003-037" }, { "db": "NVD", "id": "CVE-2000-0226" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2002-06-13T00:00:00", "db": "CERT/CC", "id": "VU#25716" }, { "date": "2000-03-20T00:00:00", "db": "BID", "id": "1066" }, { "date": "2007-04-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2000-000015" }, { "date": "2000-03-20T00:00:00", "db": "CNNVD", "id": "CNNVD-200003-037" }, { "date": "2000-03-20T05:00:00", "db": "NVD", "id": "CVE-2000-0226" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2002-06-13T00:00:00", "db": "CERT/CC", "id": "VU#25716" }, { "date": "2000-03-20T00:00:00", "db": "BID", "id": "1066" }, { "date": "2007-04-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2000-000015" }, { "date": "2005-10-12T00:00:00", "db": "CNNVD", "id": "CNNVD-200003-037" }, { "date": "2024-11-20T23:32:00.650000", "db": "NVD", "id": "CVE-2000-0226" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-200003-037" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Chunked encoding post can consume excessive memory on IIS 4.0 webserver", "sources": [ { "db": "CERT/CC", "id": "VU#25716" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer overflow", "sources": [ { "db": "CNNVD", "id": "CNNVD-200003-037" } ], "trust": 0.6 } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.