Public exploits available
On this page
There is a remote code execution vulnerability in Internet Information Services (IIS) 5.1 on Windows XP Professional Service Pack 2 that could allow an attacker who successfully exploited this vulnerability to take complete control of the affected system. An attacker could exploit the vulnerability by sending specially crafted URL requests to a Web page hosted by Internet Information Services.
An attacker who successfully exploited this vulnerability could take complete control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
Technical details (analysis)
An unchecked buffer in an object Internet Information Services 5.1 URL parser uses to maintain statistics on hosted applications causes this vulnerability. An attacker could send specially crafted URL requests to a Web site hosted by IIS 5.1 on Windows XP Professional Service Pack 2. If successfully exploited, this remote code execution vulnerability could allow the attacker to run arbitrary code within the context of the local system account.
Microsoft Internet Information Services (IIS) 5.1
Windows 2000 Service Pack 4
Windows XP Home Service Pack 2
Windows XP Professional x64 Edition and Windows XP Professional x64 Edition Service Pack 2
Windows Server 2003 Service Pack 1 and Windows Server 2003 Service Pack 2
Windows Server 2003 x64 Edition and Windows Server 2003 x64 Edition Service Pack 2
Windows Server 2003 with SP1 for Itanium-based Systems and Windows Server 2003 with SP2 for Itanium-based Systems
Windows Vista x64 Edition
Release Date: 2007-08-28T00:00:00
Known false positives
No known false positives at this time.
Use URLScan 2.5.
To help protect from network-based attempts to exploit this vulnerability, block access to port 80 (TCP).