Lucene search

K

ISA Server 2000 and Proxy Server 2.0 Internet Content Spoofing (888258)

🗓️ 03 Nov 2005 00:00:00Reported by Copyright (C) 2004 Jeff AdamsType 
openvas
 openvas
🔗 plugins.openvas.org👁 21 Views

ISA Server 2000 and Proxy Server 2.0 vulnerabilit

Show more
Related
Refs
Code
ReporterTitlePublishedViews
Family
Tenable Nessus
MS04-039: ISA Server 2000 and Proxy Server 2.0 Internet Content Spoofing (888258)
13 Nov 200400:00
nessus
OpenVAS
ISA Server 2000 and Proxy Server 2.0 Internet Content Spoofing (888258)
3 Nov 200500:00
openvas
NVD
CVE-2004-0892
27 Jan 200505:00
nvd
Cvelist
CVE-2004-0892
16 Nov 200405:00
cvelist
securityvulns
Microsoft Security Bulletin MS04-039
10 Nov 200400:00
securityvulns
CVE
CVE-2004-0892
27 Jan 200505:00
cve
# SPDX-FileCopyrightText: 2004 Jeff Adams
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only

if(description)
{
  script_oid("1.3.6.1.4.1.25623.1.0.15714");
  script_version("2023-08-03T05:05:16+0000");
  script_tag(name:"last_modification", value:"2023-08-03 05:05:16 +0000 (Thu, 03 Aug 2023)");
  script_tag(name:"creation_date", value:"2005-11-03 14:08:04 +0100 (Thu, 03 Nov 2005)");
  script_tag(name:"cvss_base", value:"7.5");
  script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:P/I:P/A:P");
  script_cve_id("CVE-2004-0892");
  script_name("ISA Server 2000 and Proxy Server 2.0 Internet Content Spoofing (888258)");
  script_category(ACT_GATHER_INFO);
  script_copyright("Copyright (C) 2004 Jeff Adams");
  script_family("Windows : Microsoft Bulletins");
  script_dependencies("smb_reg_service_pack.nasl");
  script_mandatory_keys("SMB/WindowsVersion");

  script_tag(name:"summary", value:"The ISA Server 2000 and Proxy Server 2.0 have been found to be vulnerable to
  a spoofing vulnerability that could enable an attacker to spoof trusted Internet
  content. Users could believe they are accessing trusted Internet content when
  in reality they are accessing malicious Internet content, for example a
  malicious Web site. However, an attacker would first have to persuade a user to
  visit the attacker's to attempt to exploit this vulnerability.");

  script_xref(name:"URL", value:"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-039");

  script_tag(name:"qod_type", value:"registry");

  script_tag(name:"solution_type", value:"WillNotFix");

  script_tag(name:"solution", value:"No known solution was made available for at least one year
  since the disclosure of this vulnerability. Likely none will be provided anymore.
  General solution options are to upgrade to a newer release, disable respective features,
  remove the product or replace the product by another one.");

  exit(0);
}

fpc = get_kb_item("SMB/Registry/HKLM/SOFTWARE/Microsoft/Fpc");
if (!fpc) exit(0);

fix = get_kb_item("SMB/Registry/HKLM/SOFTWARE/Microsoft/Fpc/Hotfixes/SP1/408");
if(!fix)security_message(port:0);

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
03 Nov 2005 00:00Current
6.5Medium risk
Vulners AI Score6.5
CVSS27.5
EPSS0.27952
21
.json
Report