Follow:

Vulnerability:Win/IIS.Request.RCE!CVE-2005-4360

Severity rating
Critical

Class/Type
Vulnerability

Discovered date
2007-08-28T00:00:00

Attack vector
Remote

Authentication required
No

Public exploits available
Yes

Signature detection
Medium



On this page




Description

There is a remote code execution vulnerability in Internet Information Services (IIS) 5.1 on Windows XP Professional Service Pack 2 that could allow an attacker who successfully exploited this vulnerability to take complete control of the affected system. An attacker could exploit the vulnerability by sending specially crafted URL requests to a Web page hosted by Internet Information Services.



Impact

An attacker who successfully exploited this vulnerability could take complete control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.



Technical details (analysis)

An unchecked buffer in an object Internet Information Services 5.1 URL parser uses to maintain statistics on hosted applications causes this vulnerability. An attacker could send specially crafted URL requests to a Web site hosted by IIS 5.1 on Windows XP Professional Service Pack 2. If successfully exploited, this remote code execution vulnerability could allow the attacker to run arbitrary code within the context of the local system account.



Affected software

Microsoft Internet Information Services (IIS) 5.1



Non-affected software

Windows 2000 Service Pack 4
Windows XP Home Service Pack 2
Windows XP Professional x64 Edition and Windows XP Professional x64 Edition Service Pack 2
Windows Server 2003 Service Pack 1 and Windows Server 2003 Service Pack 2
Windows Server 2003 x64 Edition and Windows Server 2003 x64 Edition Service Pack 2
Windows Server 2003 with SP1 for Itanium-based Systems and Windows Server 2003 with SP2 for Itanium-based Systems
Windows Vista
Windows Vista x64 Edition



References




Solutions




NIS signature

Name: Vulnerability:Win/IIS.Request.RCE!CVE-2005-4360
Release Date: 2007-08-28T00:00:00



Known false positives

No known false positives at this time.



Work-arounds

Use URLScan 2.5.
To help protect from network-based attempts to exploit this vulnerability, block access to port 80 (TCP).