Microsoft Internet Security 和 Acceleration (ISA) Server 2000 Web Proxy服务拒绝漏洞

Microsoft Internet Security 和 Acceleration (ISA) Server 2000 Web Proxy服务拒绝漏洞

漏洞ID 1106301 漏洞类型 未知
发布时间 2001-04-16 更新时间 2005-05-02
图片[1]-Microsoft Internet Security 和 Acceleration (ISA) Server 2000 Web Proxy服务拒绝漏洞-安全小百科CVE编号 CVE-2001-0239
图片[2]-Microsoft Internet Security 和 Acceleration (ISA) Server 2000 Web Proxy服务拒绝漏洞-安全小百科CNNVD-ID CNNVD-200107-043
漏洞平台 Windows CVSS评分 7.5
|漏洞来源
https://www.exploit-db.com/exploits/20763
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200107-043
|漏洞详情
MicrosoftInternetSecurity和Acceleration(ISA)Server2000WebProxy存在漏洞。远程攻击者可以借助具有特定类型的超长web请求导致服务拒绝。
|漏洞EXP
source: http://www.securityfocus.com/bid/2600/info

It is possible for a user to cause the Web Proxy service on a host running MS ISA Server to stop responding.

If a HTTP request with an unusually long path is submitted, the Web Proxy service could stop responding.

This vulnerability is only exploitable from the internal network unless the Web Publishing service has been enabled, in which case it can be exploited from either internal or external networks. It is disabled by default.

A HTML email containing the malicious URL in an image tag or a javascript URL, could invoke a user's browser. An attempt to fulfill this request by the Web Proxy service, could instigate the denial of service condition on an internal users system. This is a potential way a remote attacker could exploit this vulnerability even if Web Publishing is disabled.

* It has been reported that the execution of arbitrary commands is possible. If this is the case the complete remote compromise of the host may be achievable. The latest findings have not been confirmed by anyone other than the person who posted about it. 

/*
 * repeat.c -- quick-n-dirty hack to output argv[2] instances of the
 * character whose ASCII value is given as argv[1]
 *
 * WARNING - this has absolutely no error checking!
 */

#include <stdio.h>

main (int argc, char **argv) {
  int character;
  long repetitions, i;

  if ( argc != 3 ) {
    printf("usage: repeat char repsn");
    exit(1);
  }
  character = atoi(argv[1]);
  repetitions = atol(argv[2]);

  for (i = 0L; i < repetitions; i++) {
    printf ("%c", character);
  }
}
|参考资料

来源:BID
名称:2600
链接:http://www.securityfocus.com/bid/2600
来源:MS
名称:MS01-021
链接:http://www.microsoft.com/technet/security/bulletin/MS01-021.asp
来源:BUGTRAQ
名称:20010427MicrosoftISAServerVulnerability
链接:http://www.securityfocus.com/archive/1/179986
来源:BUGTRAQ
名称:20010417[SX-20010320-2b]-Followupre.MicrosoftISAServerDenialofService
链接:http://www.securityfocus.com/archive/1/177160
来源:BUGTRAQ
名称:20010416[SX-20010320-2]-MicrosoftISAServerDenialofService
链接:http://www.securityfocus.com/archive/1/176912
来源:XF
名称:isa-web-proxy-dos(6383)
链接:http://xforce.iss.net/static/6383.php
来源:CIAC
名称:L-073
链接:http://www.ciac.org/ciac/bulletins/l-073.shtml

相关推荐: Microsoft IE MIME Header Attachment Execution Vulnerability

Microsoft IE MIME Header Attachment Execution Vulnerability 漏洞ID 1103368 漏洞类型 Failure to Handle Exceptional Conditions 发布时间 2001-0…

© 版权声明
THE END
喜欢就支持一下吧
点赞0
分享