7.9 High
AI Score
Confidence
High
9 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:S/C:C/I:C/A:C
0.966 High
EPSS
Percentile
99.6%
Integer overflow in the Internet Printing Protocol (IPP) ISAPI extension in Microsoft Internet Information Services (IIS) 5.0 through 7.0 on Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP1 and SP2, and Server 2008 allows remote authenticated users to execute arbitrary code via an HTTP POST request that triggers an outbound IPP connection from a web server to a machine operated by the attacker, aka “Integer Overflow in IPP Service Vulnerability.”
CPE | Name | Operator | Version |
---|---|---|---|
internet_information_services | ge | 5.0 | |
internet_information_services | le | 7.0 |
secunia.com/advisories/32248
www.kb.cert.org/vuls/id/793233
www.securityfocus.com/bid/31682
www.securitytracker.com/id?1021048
www.us-cert.gov/cas/techalerts/TA08-288A.html
www.vupen.com/english/advisories/2008/2813
docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-062
exchange.xforce.ibmcloud.com/vulnerabilities/45545
exchange.xforce.ibmcloud.com/vulnerabilities/45548
marc.info/?l=bugtraq&m=122479227205998&w=2
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5764