Microsoft IIS 4.0 - ISAPI Buffer Overflow

2000-11-06T00:00:00
ID EXPLOITPACK:005AA0592B53379343D88298616ADBA5
Type exploitpack
Reporter Marc Maiffret
Modified 2000-11-06T00:00:00

Description

Microsoft IIS 4.0 - ISAPI Buffer Overflow

                                        
                                            source: https://www.securityfocus.com/bid/1911/info

The ASP ISAPI file parser does not properly execute certain malformed ASP files that contain scripts with the LANGUAGE parameter containing a buffer of over 2200 characters and have the RUNAT value set as 'server'. Depending on the data entered into the buffer, a denial of service attack could be launched or arbitrary code could be executed under the SYSTEM privilege level in the event that a malicious ASP file were locally executed on IIS.

https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/20383.zip