Lucene search

K
certCERTVU:279156
HistoryNov 12, 2003 - 12:00 a.m.

Microsoft FrontPage Server Extensions contains buffer overflow in remote debugging functionality

2003-11-1200:00:00
www.kb.cert.org
20

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.971 High

EPSS

Percentile

99.8%

Overview

Microsoft FrontPage Server Extensions contains a vulnerability that allows remote attackers to execute arbitrary code with local system privileges.

Description

Microsoft FrontPage Server Extensions (FPSE) is an optional set of tools that adds functionality to a web site. This functionality includes remote server administration, content updates, and a variety of site-specific tools such as searching support and form handling. According to MS03-051, FPSE is installed by default on Internet Information Server (IIS) 4.0, 5.0, and 5.1.

The FPSE contains a buffer overflow vulnerability in its support of remote debugging. This vulnerability can be exploited by an unauthenticated remote attacker and allows arbitrary code to be executed with local system privileges.


Impact

This vulnerability allows unauthenticated remote attackers to execute arbitrary code with local system privileges.


Solution

Apply a patch from Microsoft

Microsoft has published Microsoft Security Bulletin MS03-051 to address this vulnerability. For a complete list of systems affected, please read the Microsoft bulletin.


Disable FrontPage Server Extensions

As a an interim measure, sites may reduce their exposure to this vulnerability by disabling FrontPage Server Extensions. Note that this may reduce the functionality of sites that utilize FPSE extensions.

Disable Internet Information Server

The IIS web server is installed by default on several versions of Microsoft Windows. As a general rule, the CERT/CC recommends that system administrators disable or remove any nonessential software. In this case, IIS should be removed from any host that is not expected to serve web pages.


Vendor Information

279156

Filter by status: All Affected Not Affected Unknown

Filter by content: __ Additional information available

__ Sort by: Status Alphabetical

Expand all

Javascript is disabled. Click here to view vendors.

Microsoft Corporation __ Affected

Notified: November 12, 2003 Updated: November 12, 2003

Status

Affected

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

Microsoft has published Microsoft Security Bulletin MS03-051 to address this vulnerability. For a complete list of systems affected, please read the Microsoft bulletin.

If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23279156 Feedback>).

CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

Acknowledgements

This vulnerability was reported to Microsoft by Brett More of Security-Assessment.com.

This document was written by Jeffrey P. Lanza and is based upon information provided by Microsoft.

Other Information

CVE IDs: CVE-2003-0822
Severity Metric: 52.31 Date Public:

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.971 High

EPSS

Percentile

99.8%