var-200512-1034
Vulnerability from variot

The URL parser in Microsoft Internet Information Services (IIS) 5.1 on Windows XP Professional SP2 allows remote attackers to execute arbitrary code via multiple requests to ".dll" followed by arguments such as "~0" through "~9", which causes ntdll.dll to produce a return value that is not correctly handled by IIS, as demonstrated using "/_vti_bin/.dll/*/~0". NOTE: the consequence was originally believed to be only a denial of service (application crash and reboot). Microsoft IIS To the virtual directory [ Scripts and executables ] If you have enabled execute access for a specific directory for this virtual directory, HTTP request (URL) Because there are deficiencies in handling inetinfo.exe Contains a vulnerability that crashes.Microsoft IIS so ASP And CGI Using Web Application disrupted service operation (DoS) It may be in a state. Microsoft IIS is prone to a remote code-execution vulnerability because the application fails to properly bounds-check user-supplied data before copying it to an insufficiently sized memory buffer. Successfully exploiting this issue allows remote attackers to execute arbitrary code in the context of the vulnerable application, which may lead to the complete compromise of affected computers. This issue affects Microsoft IIS 5.1 running on Windows XP SP2. Note: this issue was previously reported as a denial-of-service vulnerability. New information from the vendor states that code execution is possible. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1

                    National Cyber Alert System

             Technical Cyber Security Alert TA07-191A

Microsoft Updates for Multiple Vulnerabilities

Original release date: July 10, 2007 Last revised: -- Source: US-CERT

Systems Affected

 * Microsoft Windows
 * Microsoft Excel
 * Microsoft Publisher
 * Microsoft .NET Framework
 * Microsoft Internet Information Services (IIS)
 * Microsoft Windows Vista Firewall

Overview

Microsoft has released updates that address critical vulnerabilities in Microsoft Windows, Excel, Publisher, .NET Framework, Internet Information Services, and Windows Vista Firewall.

I. Description

Microsoft has released updates to address vulnerabilities that affect Microsoft Windows, Excel, Publisher, .NET Framework, Internet Information Services, and Windows Vista Firewall as part of the Microsoft Security Bulletin Summary for July 2007.

Further information about the vulnerabilities addressed by these updates is available in the Vulnerability Notes Database

II. An attacker may also be able to cause a denial of service.

III. Solution

Apply updates from Microsoft

Microsoft has provided updates for these vulnerabilities in the July 2007 Security Bulletins. The Security Bulletins describe any known issues related to the updates. Administrators are encouraged to note any known issues that are described in the Bulletins and test for any potentially adverse effects.

System administrators may wish to consider using an automated patch distribution system such as Windows Server Update Services (WSUS).

IV. References

 * US-CERT Vulnerability Notes for Microsoft July 2007 updates -
   <http://www.kb.cert.org/vuls/byid?searchview&query=ms07-jul>

* Securing Your Web Browser -
   <http://www.us-cert.gov/reading_room/securing_browser/>

 * Microsoft Security Bulletin Summary for July 2007 -
   <http://www.microsoft.com/technet/security/bulletin/ms07-jul.mspx>

 * Microsoft Update - <https://update.microsoft.com/microsoftupdate/>

 * Microsoft Office Update - <http://officeupdate.microsoft.com/>

 * Windows Server Update Services -
   <http://www.microsoft.com/windowsserversystem/updateservices/default.mspx>

The most recent version of this document can be found at:

 <http://www.us-cert.gov/cas/techalerts/TA07-191A.html>

Feedback can be directed to US-CERT Technical Staff. Please send email to cert@cert.org with "TA07-191A Feedback VU#487905" in the subject.

For instructions on subscribing to or unsubscribing from this mailing list, visit http://www.us-cert.gov/cas/signup.html.

Produced 2007 by US-CERT, a government organization.

Terms of use:

 <http://www.us-cert.gov/legal.html>

Revision History

July 10, 2007: Initial release

-----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.1 (GNU/Linux)

iQEVAwUBRpPwhvRFkHkM87XOAQKWiQf/XFpYurcCFZ1qG700NatqdY7wL6pO4qbv hGzdzUJH+aRN7b6XaEE/ZLprWnyj2H8HbH+HAHOuKDOxBI7N6PQ4WPaeZ14tDsNP pNFg81LjE5Hlj6h5N2p8XML3t/4X7a7wk5YB7nhiBdisxAJ7iNjQ1BawjTlA9/kl dTaIRW2njHpupGLWuin60U/di12jI3JirgJHfiRK6Ruiqnv56rM7LS9IOT1HV5RR 0otIr1Dttdnmgveb0YOiz7A36nwMiCEUzcUu2rKzARpZ4gMBIrSbfkAJpyUE0w3K WMh1tgEt3fooTgvBUhpDjfxbMNka85wGbpizcsKnw6VVzIQAlr0y3Q== =FRhW -----END PGP SIGNATURE----- .

The vulnerability is caused due to an error in the handling of certain malformed URL.

Example: http://[host]/[dir]/.dll/%01~0

Successful exploitation requires that "[dir]" is a virtual directory that is configured with "Scripts & Executables" execution permissions.

Note: IIS will automatically restart after the crash.

SOLUTION: Filter potential malicious characters or character sequences with a HTTP proxy.

IIS 5.0 and 6.0 are reportedly not affected.

PROVIDED AND/OR DISCOVERED BY: Inge Henriksen

ORIGINAL ADVISORY: http://ingehenriksen.blogspot.com/2005/12/microsoft-iis-remote-dos-dll-url.html

About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.

Subscribe: http://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/

Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.

Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-200512-1034",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "iis",
        "scope": "eq",
        "trust": 1.1,
        "vendor": "microsoft",
        "version": "5.1"
      },
      {
        "model": "internet information services",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "microsoft",
        "version": "5.1"
      },
      {
        "model": "windows xp",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "microsoft",
        "version": "sp3"
      },
      {
        "model": "windows xp",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "microsoft",
        "version": "sp2"
      },
      {
        "model": "messaging application server mm",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "avaya",
        "version": "3.1"
      },
      {
        "model": "messaging application server mm",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "avaya",
        "version": "3.0"
      },
      {
        "model": "messaging application server mm",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "avaya",
        "version": "2.0"
      }
    ],
    "sources": [
      {
        "db": "BID",
        "id": "15921"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2005-000739"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200512-423"
      },
      {
        "db": "NVD",
        "id": "CVE-2005-4360"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/a:microsoft:iis",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:microsoft:windows_xp",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2005-000739"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Inge Henriksen  inge.henriksen@booleansoft.com",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200512-423"
      }
    ],
    "trust": 0.6
  },
  "cve": "CVE-2005-4360",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "NONE",
            "baseScore": 7.8,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "id": "CVE-2005-4360",
            "impactScore": 6.9,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 1.0,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:C/A:N",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Low",
            "accessVector": "Network",
            "authentication": "None",
            "author": "NVD",
            "availabilityImpact": "Complete",
            "baseScore": 7.8,
            "confidentialityImpact": "None",
            "exploitabilityScore": null,
            "id": "CVE-2005-4360",
            "impactScore": null,
            "integrityImpact": "None",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "High",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2005-4360",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "NVD",
            "id": "CVE-2005-4360",
            "trust": 0.8,
            "value": "High"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-200512-423",
            "trust": 0.6,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2005-000739"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200512-423"
      },
      {
        "db": "NVD",
        "id": "CVE-2005-4360"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "The URL parser in Microsoft Internet Information Services (IIS) 5.1 on Windows XP Professional SP2 allows remote attackers to execute arbitrary code via multiple requests to \".dll\" followed by arguments such as \"~0\" through \"~9\", which causes ntdll.dll to produce a return value that is not correctly handled by IIS, as demonstrated using \"/_vti_bin/.dll/*/~0\".  NOTE: the consequence was originally believed to be only a denial of service (application crash and reboot). Microsoft IIS To the virtual directory [ Scripts and executables ] If you have enabled execute access for a specific directory for this virtual directory, HTTP request (URL) Because there are deficiencies in handling inetinfo.exe Contains a vulnerability that crashes.Microsoft IIS so ASP And CGI Using Web Application disrupted service operation (DoS) It may be in a state. Microsoft IIS is prone to a remote code-execution vulnerability because the application fails to properly bounds-check user-supplied data before copying it to an insufficiently sized memory buffer. \nSuccessfully exploiting this issue allows remote attackers to execute arbitrary code in the context of the vulnerable application, which may lead to the complete compromise of affected computers. \nThis issue affects Microsoft IIS 5.1 running on Windows XP SP2. \nNote: this issue was previously reported as a denial-of-service vulnerability. New information from the vendor states that code execution is possible. \n-----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n                        National Cyber Alert System\n\n                 Technical Cyber Security Alert TA07-191A\n\n\nMicrosoft Updates for Multiple Vulnerabilities\n\n   Original release date: July 10, 2007\n   Last revised: --\n   Source: US-CERT\n\n\nSystems Affected\n\n     * Microsoft Windows\n     * Microsoft Excel\n     * Microsoft Publisher\n     * Microsoft .NET Framework\n     * Microsoft Internet Information Services (IIS)\n     * Microsoft Windows Vista Firewall\n\n\nOverview\n\n   Microsoft has released updates that address critical vulnerabilities\n   in Microsoft Windows, Excel, Publisher, .NET Framework, Internet\n   Information Services, and Windows Vista Firewall. \n\n\nI. Description\n\n   Microsoft has released updates to address vulnerabilities that affect\n   Microsoft Windows, Excel, Publisher, .NET Framework, Internet\n   Information Services, and Windows Vista Firewall as part of the\n   Microsoft Security Bulletin Summary for July 2007. \n\n   Further information about the vulnerabilities addressed by these\n   updates is available in the Vulnerability Notes Database\n\n\nII. An attacker may also be able to cause a denial of\n   service. \n\n\nIII. Solution\n\nApply updates from Microsoft\n\n   Microsoft has provided updates for these vulnerabilities in the July\n   2007 Security Bulletins. The Security Bulletins describe any known\n   issues related to the updates. Administrators are encouraged to note\n   any known issues that are described in the Bulletins and test for any\n   potentially adverse effects. \n\n   System administrators may wish to consider using an automated patch\n   distribution system such as Windows Server Update Services (WSUS). \n\n\nIV. References\n\n     * US-CERT Vulnerability Notes for Microsoft July 2007 updates -\n       \u003chttp://www.kb.cert.org/vuls/byid?searchview\u0026query=ms07-jul\u003e\n \n    * Securing Your Web Browser -\n       \u003chttp://www.us-cert.gov/reading_room/securing_browser/\u003e\n\n     * Microsoft Security Bulletin Summary for July 2007 -\n       \u003chttp://www.microsoft.com/technet/security/bulletin/ms07-jul.mspx\u003e\n\n     * Microsoft Update - \u003chttps://update.microsoft.com/microsoftupdate/\u003e\n\n     * Microsoft Office Update - \u003chttp://officeupdate.microsoft.com/\u003e\n \n     * Windows Server Update Services -\n       \u003chttp://www.microsoft.com/windowsserversystem/updateservices/default.mspx\u003e\n\n\n ____________________________________________________________________\n\n   The most recent version of this document can be found at:\n\n     \u003chttp://www.us-cert.gov/cas/techalerts/TA07-191A.html\u003e\n ____________________________________________________________________\n\n   Feedback can be directed to US-CERT Technical Staff. Please send\n   email to \u003ccert@cert.org\u003e with \"TA07-191A Feedback VU#487905\" in the\n   subject. \n ____________________________________________________________________\n\n   For instructions on subscribing to or unsubscribing from this\n   mailing list, visit \u003chttp://www.us-cert.gov/cas/signup.html\u003e. \n ____________________________________________________________________\n\n   Produced 2007 by US-CERT, a government organization. \n\n   Terms of use:\n\n     \u003chttp://www.us-cert.gov/legal.html\u003e\n ____________________________________________________________________\n\n\n   Revision History\n\n   July 10, 2007: Initial release\n\n\n\n\n\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.2.1 (GNU/Linux)\n\niQEVAwUBRpPwhvRFkHkM87XOAQKWiQf/XFpYurcCFZ1qG700NatqdY7wL6pO4qbv\nhGzdzUJH+aRN7b6XaEE/ZLprWnyj2H8HbH+HAHOuKDOxBI7N6PQ4WPaeZ14tDsNP\npNFg81LjE5Hlj6h5N2p8XML3t/4X7a7wk5YB7nhiBdisxAJ7iNjQ1BawjTlA9/kl\ndTaIRW2njHpupGLWuin60U/di12jI3JirgJHfiRK6Ruiqnv56rM7LS9IOT1HV5RR\n0otIr1Dttdnmgveb0YOiz7A36nwMiCEUzcUu2rKzARpZ4gMBIrSbfkAJpyUE0w3K\nWMh1tgEt3fooTgvBUhpDjfxbMNka85wGbpizcsKnw6VVzIQAlr0y3Q==\n=FRhW\n-----END PGP SIGNATURE-----\n. \n\nThe vulnerability is caused due to an error in the handling of\ncertain malformed URL. \n\nExample:\nhttp://[host]/[dir]/.dll/%01~0\n\nSuccessful exploitation requires that \"[dir]\" is a virtual directory\nthat is configured with \"Scripts \u0026 Executables\" execution\npermissions. \n\nNote: IIS will automatically restart after the crash. \n\nSOLUTION:\nFilter potential malicious characters or character sequences with a\nHTTP proxy. \n\nIIS 5.0 and 6.0 are reportedly not affected. \n\nPROVIDED AND/OR DISCOVERED BY:\nInge Henriksen\n\nORIGINAL ADVISORY:\nhttp://ingehenriksen.blogspot.com/2005/12/microsoft-iis-remote-dos-dll-url.html\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2005-4360"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2005-000739"
      },
      {
        "db": "BID",
        "id": "15921"
      },
      {
        "db": "PACKETSTORM",
        "id": "57622"
      },
      {
        "db": "PACKETSTORM",
        "id": "42416"
      }
    ],
    "trust": 2.07
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2005-4360",
        "trust": 2.7
      },
      {
        "db": "BID",
        "id": "15921",
        "trust": 2.7
      },
      {
        "db": "USCERT",
        "id": "TA07-191A",
        "trust": 2.5
      },
      {
        "db": "SECUNIA",
        "id": "18106",
        "trust": 2.5
      },
      {
        "db": "OSVDB",
        "id": "21805",
        "trust": 2.4
      },
      {
        "db": "SECTRACK",
        "id": "1015376",
        "trust": 2.4
      },
      {
        "db": "SREASON",
        "id": "271",
        "trust": 1.6
      },
      {
        "db": "VUPEN",
        "id": "ADV-2005-2963",
        "trust": 1.6
      },
      {
        "db": "USCERT",
        "id": "SA07-191A",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2005-000739",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200512-423",
        "trust": 0.6
      },
      {
        "db": "PACKETSTORM",
        "id": "57622",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "42416",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "BID",
        "id": "15921"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2005-000739"
      },
      {
        "db": "PACKETSTORM",
        "id": "57622"
      },
      {
        "db": "PACKETSTORM",
        "id": "42416"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200512-423"
      },
      {
        "db": "NVD",
        "id": "CVE-2005-4360"
      }
    ]
  },
  "id": "VAR-200512-1034",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VARIoT devices database",
        "id": null
      }
    ],
    "trust": 1.0
  },
  "last_update_date": "2024-11-23T20:19:29.968000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "MS07-041",
        "trust": 0.8,
        "url": "http://www.microsoft.com/technet/security/bulletin/MS07-041.mspx"
      },
      {
        "title": "MS07-041",
        "trust": 0.8,
        "url": "http://www.microsoft.com/japan/technet/security/bulletin/ms07-041.mspx"
      },
      {
        "title": "MS07-041e",
        "trust": 0.8,
        "url": "http://www.microsoft.com/japan/security/bulletins/MS07-041e.mspx"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2005-000739"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-252",
        "trust": 1.0
      },
      {
        "problemtype": "CWE-20",
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2005-000739"
      },
      {
        "db": "NVD",
        "id": "CVE-2005-4360"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.4,
        "url": "http://www.osvdb.org/21805"
      },
      {
        "trust": 2.4,
        "url": "http://www.securityfocus.com/bid/15921"
      },
      {
        "trust": 2.4,
        "url": "http://securitytracker.com/alerts/2005/dec/1015376.html"
      },
      {
        "trust": 2.4,
        "url": "http://www.us-cert.gov/cas/techalerts/ta07-191a.html"
      },
      {
        "trust": 2.0,
        "url": "http://ingehenriksen.blogspot.com/2005/12/microsoft-iis-remote-dos-dll-url.html"
      },
      {
        "trust": 1.6,
        "url": "http://www.securityfocus.com/archive/1/419707/100/0/threaded"
      },
      {
        "trust": 1.6,
        "url": "http://securityreason.com/securityalert/271"
      },
      {
        "trust": 1.6,
        "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-041"
      },
      {
        "trust": 1.6,
        "url": "http://secunia.com/advisories/18106"
      },
      {
        "trust": 1.6,
        "url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a1703"
      },
      {
        "trust": 1.6,
        "url": "http://www.vupen.com/english/advisories/2005/2963"
      },
      {
        "trust": 1.6,
        "url": "http://archive.cert.uni-stuttgart.de/bugtraq/2007/07/msg00254.html"
      },
      {
        "trust": 0.9,
        "url": "http://secunia.com/advisories/18106/"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2005-4360"
      },
      {
        "trust": 0.8,
        "url": "http://www.frsirt.com/english/advisories/2005/2963"
      },
      {
        "trust": 0.8,
        "url": "http://www.jpcert.or.jp/at/2007/at070017.txt"
      },
      {
        "trust": 0.8,
        "url": "http://jvn.jp/cert/jvnta07-191a/index.html"
      },
      {
        "trust": 0.8,
        "url": "http://jvn.jp/tr/trta07-191a/index.html"
      },
      {
        "trust": 0.8,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2005-4360"
      },
      {
        "trust": 0.8,
        "url": "http://isc.sans.org/diary.php?storyid=944"
      },
      {
        "trust": 0.8,
        "url": "http://www.us-cert.gov/cas/alerts/sa07-191a.html"
      },
      {
        "trust": 0.8,
        "url": "http://www.iss.net/threats/268.html"
      },
      {
        "trust": 0.8,
        "url": "http://www.cyberpolice.go.jp/index.html#topics"
      },
      {
        "trust": 0.3,
        "url": "http://www.microsoft.com/windowsserver2003/iis/default.mspx"
      },
      {
        "trust": 0.3,
        "url": "/archive/1/419707"
      },
      {
        "trust": 0.3,
        "url": "http://support.avaya.com/elmodocs2/security/asa-2007-302.htm"
      },
      {
        "trust": 0.3,
        "url": "http://www.microsoft.com/technet/security/bulletin/ms07-041.mspx"
      },
      {
        "trust": 0.1,
        "url": "http://www.microsoft.com/technet/security/bulletin/ms07-jul.mspx\u003e"
      },
      {
        "trust": 0.1,
        "url": "https://update.microsoft.com/microsoftupdate/\u003e"
      },
      {
        "trust": 0.1,
        "url": "http://officeupdate.microsoft.com/\u003e"
      },
      {
        "trust": 0.1,
        "url": "http://www.us-cert.gov/legal.html\u003e"
      },
      {
        "trust": 0.1,
        "url": "http://www.us-cert.gov/reading_room/securing_browser/\u003e"
      },
      {
        "trust": 0.1,
        "url": "http://www.microsoft.com/windowsserversystem/updateservices/default.mspx\u003e"
      },
      {
        "trust": 0.1,
        "url": "http://www.us-cert.gov/cas/techalerts/ta07-191a.html\u003e"
      },
      {
        "trust": 0.1,
        "url": "http://www.us-cert.gov/cas/signup.html\u003e."
      },
      {
        "trust": 0.1,
        "url": "http://www.kb.cert.org/vuls/byid?searchview\u0026query=ms07-jul\u003e"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/secunia_security_advisories/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/22/"
      },
      {
        "trust": 0.1,
        "url": "http://[host]/[dir]/.dll/%01~0"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/39/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/about_secunia_advisories/"
      }
    ],
    "sources": [
      {
        "db": "BID",
        "id": "15921"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2005-000739"
      },
      {
        "db": "PACKETSTORM",
        "id": "57622"
      },
      {
        "db": "PACKETSTORM",
        "id": "42416"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200512-423"
      },
      {
        "db": "NVD",
        "id": "CVE-2005-4360"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "BID",
        "id": "15921"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2005-000739"
      },
      {
        "db": "PACKETSTORM",
        "id": "57622"
      },
      {
        "db": "PACKETSTORM",
        "id": "42416"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200512-423"
      },
      {
        "db": "NVD",
        "id": "CVE-2005-4360"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2005-12-17T00:00:00",
        "db": "BID",
        "id": "15921"
      },
      {
        "date": "2007-04-01T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2005-000739"
      },
      {
        "date": "2007-07-11T08:49:24",
        "db": "PACKETSTORM",
        "id": "57622"
      },
      {
        "date": "2005-12-19T23:37:12",
        "db": "PACKETSTORM",
        "id": "42416"
      },
      {
        "date": "2005-12-19T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200512-423"
      },
      {
        "date": "2005-12-20T01:03:00",
        "db": "NVD",
        "id": "CVE-2005-4360"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2007-07-13T15:27:00",
        "db": "BID",
        "id": "15921"
      },
      {
        "date": "2007-07-18T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2005-000739"
      },
      {
        "date": "2021-11-09T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200512-423"
      },
      {
        "date": "2024-11-21T00:04:04.647000",
        "db": "NVD",
        "id": "CVE-2005-4360"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "PACKETSTORM",
        "id": "57622"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200512-423"
      }
    ],
    "trust": 0.7
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Microsoft IIS Illegal in  HTTP Service disruption due to request processing  (DoS) Vulnerabilities",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2005-000739"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "input validation error",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200512-423"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.