ID

VAR-200109-0117


CVE

CVE-2001-0506


TITLE

Microsoft Internet Information Server (IIS) vulnerable to buffer overflow via malformed server-side include directive

Trust: 0.8

sources: CERT/CC: VU#630531

DESCRIPTION

Buffer overflow in ssinc.dll in IIS 5.0 and 4.0 allows local users to gain system privileges via a Server-Side Includes (SSI) directive for a long filename, which triggers the overflow when the directory name is added, aka the "SSI privilege elevation" vulnerability. A buffer overflow in the code that processes server-side include files on IIS 4.0 and IIS 5.0 could allow an intruder to execute code with the privileges of the web server. Microsoft IIS Implemented in SSI The function handles file names including path names to be included DLL Contains a vulnerability that causes a buffer overflow.Local System An arbitrary code may be executed with the execution right

Trust: 2.61

sources: NVD: CVE-2001-0506 // CERT/CC: VU#630531 // JVNDB: JVNDB-2001-000130 // BID: 3190

AFFECTED PRODUCTS

vendor:microsoftmodel:internet information serverscope:eqversion:4.0

Trust: 1.6

vendor:microsoftmodel:internet information servicesscope:eqversion:5.0

Trust: 1.6

vendor:microsoftmodel: - scope: - version: -

Trust: 0.8

vendor:microsoftmodel:iisscope:eqversion:4.0

Trust: 0.8

vendor:microsoftmodel:iisscope:eqversion:5.0

Trust: 0.8

vendor:microsoftmodel:internet information serverscope:eqversion:5.0

Trust: 0.6

vendor:microsoftmodel:windows nt workstation sp6ascope:eqversion:4.0

Trust: 0.3

vendor:microsoftmodel:windows nt workstation sp6scope:eqversion:4.0

Trust: 0.3

vendor:microsoftmodel:windows nt workstation sp5scope:eqversion:4.0

Trust: 0.3

vendor:microsoftmodel:windows nt workstation sp4scope:eqversion:4.0

Trust: 0.3

vendor:microsoftmodel:windows nt workstation sp3scope:eqversion:4.0

Trust: 0.3

vendor:microsoftmodel:windows nt workstation sp2scope:eqversion:4.0

Trust: 0.3

vendor:microsoftmodel:windows nt workstation sp1scope:eqversion:4.0

Trust: 0.3

vendor:microsoftmodel:windows nt workstationscope:eqversion:4.0

Trust: 0.3

vendor:microsoftmodel:windows nt terminal server sp6scope:eqversion:4.0

Trust: 0.3

vendor:microsoftmodel:windows nt terminal server sp5scope:eqversion:4.0

Trust: 0.3

vendor:microsoftmodel:windows nt terminal server sp4scope:eqversion:4.0

Trust: 0.3

vendor:microsoftmodel:windows nt terminal server sp3scope:eqversion:4.0

Trust: 0.3

vendor:microsoftmodel:windows nt terminal server sp2scope:eqversion:4.0

Trust: 0.3

vendor:microsoftmodel:windows nt terminal server sp1scope:eqversion:4.0

Trust: 0.3

vendor:microsoftmodel:windows nt terminal serverscope:eqversion:4.0

Trust: 0.3

vendor:microsoftmodel:windows nt server sp6ascope:eqversion:4.0

Trust: 0.3

vendor:microsoftmodel:windows nt server sp6scope:eqversion:4.0

Trust: 0.3

vendor:microsoftmodel:windows nt server sp5scope:eqversion:4.0

Trust: 0.3

vendor:microsoftmodel:windows nt server sp4scope:eqversion:4.0

Trust: 0.3

vendor:microsoftmodel:windows nt server sp3scope:eqversion:4.0

Trust: 0.3

vendor:microsoftmodel:windows nt server sp2scope:eqversion:4.0

Trust: 0.3

vendor:microsoftmodel:windows nt server sp1scope:eqversion:4.0

Trust: 0.3

vendor:microsoftmodel:windows nt serverscope:eqversion:4.0

Trust: 0.3

vendor:microsoftmodel:windows nt enterprise server sp6ascope:eqversion:4.0

Trust: 0.3

vendor:microsoftmodel:windows nt enterprise server sp6scope:eqversion:4.0

Trust: 0.3

vendor:microsoftmodel:windows nt enterprise server sp5scope:eqversion:4.0

Trust: 0.3

vendor:microsoftmodel:windows nt enterprise server sp4scope:eqversion:4.0

Trust: 0.3

vendor:microsoftmodel:windows nt enterprise server sp3scope:eqversion:4.0

Trust: 0.3

vendor:microsoftmodel:windows nt enterprise server sp2scope:eqversion:4.0

Trust: 0.3

vendor:microsoftmodel:windows nt enterprise server sp1scope:eqversion:4.0

Trust: 0.3

vendor:microsoftmodel:windows nt enterprise serverscope:eqversion:4.0

Trust: 0.3

vendor:microsoftmodel:windows server sp2scope:eqversion:2000

Trust: 0.3

vendor:microsoftmodel:windows server sp1scope:eqversion:2000

Trust: 0.3

vendor:microsoftmodel:windows serverscope:eqversion:2000

Trust: 0.3

vendor:microsoftmodel:windows professional sp2scope:eqversion:2000

Trust: 0.3

vendor:microsoftmodel:windows professional sp1scope:eqversion:2000

Trust: 0.3

vendor:microsoftmodel:windows professionalscope:eqversion:2000

Trust: 0.3

vendor:microsoftmodel:windows datacenter server sp2scope:eqversion:2000

Trust: 0.3

vendor:microsoftmodel:windows datacenter server sp1scope:eqversion:2000

Trust: 0.3

vendor:microsoftmodel:windows datacenter serverscope:eqversion:2000

Trust: 0.3

vendor:microsoftmodel:windows advanced server sp2scope:eqversion:2000

Trust: 0.3

vendor:microsoftmodel:windows advanced server sp1scope:eqversion:2000

Trust: 0.3

vendor:microsoftmodel:windows advanced serverscope:eqversion:2000

Trust: 0.3

vendor:microsoftmodel:windows server sp3scope:neversion:2000

Trust: 0.3

vendor:microsoftmodel:windows professional sp3scope:neversion:2000

Trust: 0.3

vendor:microsoftmodel:windows datacenter server sp3scope:neversion:2000

Trust: 0.3

vendor:microsoftmodel:windows advanced server sp3scope:neversion:2000

Trust: 0.3

sources: CERT/CC: VU#630531 // BID: 3190 // JVNDB: JVNDB-2001-000130 // CNNVD: CNNVD-200109-088 // NVD: CVE-2001-0506

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2001-0506
value: HIGH

Trust: 1.0

CARNEGIE MELLON: VU#630531
value: 12.66

Trust: 0.8

NVD: CVE-2001-0506
value: HIGH

Trust: 0.8

CNNVD: CNNVD-200109-088
value: HIGH

Trust: 0.6

nvd@nist.gov: CVE-2001-0506
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

sources: CERT/CC: VU#630531 // JVNDB: JVNDB-2001-000130 // CNNVD: CNNVD-200109-088 // NVD: CVE-2001-0506

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

sources: NVD: CVE-2001-0506

THREAT TYPE

local

Trust: 0.9

sources: BID: 3190 // CNNVD: CNNVD-200109-088

TYPE

buffer overflow

Trust: 0.6

sources: CNNVD: CNNVD-200109-088

CONFIGURATIONS

sources: JVNDB: JVNDB-2001-000130

PATCH

title:MS01-044url:http://www.microsoft.com/technet/Security/Bulletin/ms01-044.asp

Trust: 0.8

title:MS01-044url:http://www.microsoft.com/japan/technet/security/bulletin/MS01-044.mspx

Trust: 0.8

sources: JVNDB: JVNDB-2001-000130

EXTERNAL IDS

db:BIDid:3190

Trust: 3.5

db:NVDid:CVE-2001-0506

Trust: 2.4

db:CERT/CCid:VU#630531

Trust: 0.8

db:JVNDBid:JVNDB-2001-000130

Trust: 0.8

db:XFid:6984

Trust: 0.6

db:BUGTRAQid:20010817 NSFOCUS SA2001-06 : MICROSOFT IIS SSINC.DLL BUFFER OVERFLOW VULNERABILITY

Trust: 0.6

db:BUGTRAQid:20011127 IIS SERVER SIDE INCLUDE BUFFER OVERFLOW EXPLOIT CODE

Trust: 0.6

db:CIACid:L-132

Trust: 0.6

db:MSid:MS01-044

Trust: 0.6

db:CNNVDid:CNNVD-200109-088

Trust: 0.6

sources: CERT/CC: VU#630531 // BID: 3190 // JVNDB: JVNDB-2001-000130 // CNNVD: CNNVD-200109-088 // NVD: CVE-2001-0506

REFERENCES

url:http://www.securityfocus.com/bid/3190

Trust: 3.2

url:http://www.microsoft.com/technet/security/bulletin/ms01-044.asp

Trust: 1.7

url:http://www.ciac.org/ciac/bulletins/l-132.shtml

Trust: 1.6

url:http://online.securityfocus.com/archive/1/242541

Trust: 1.6

url:http://marc.info/?l=bugtraq&m=99802093532233&w=2

Trust: 1.0

url:https://docs.microsoft.com/en-us/security-updates/securitybulletins/2001/ms01-044

Trust: 1.0

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/6984

Trust: 1.0

url:http://support.microsoft.com/default.aspx?scid=kb;en-us;q301625

Trust: 0.8

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2001-0506

Trust: 0.8

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2001-0506

Trust: 0.8

url:http://xforce.iss.net/static/6984.php

Trust: 0.6

url:http://marc.theaimsgroup.com/?l=bugtraq&m=99802093532233&w=2

Trust: 0.6

url:http://www.microsoft.com/technet/security

Trust: 0.3

url:http://www.nsfocus.com

Trust: 0.3

sources: CERT/CC: VU#630531 // BID: 3190 // JVNDB: JVNDB-2001-000130 // CNNVD: CNNVD-200109-088 // NVD: CVE-2001-0506

CREDITS

This vulnerability was reported by the NSFocus Security Team.

Trust: 0.3

sources: BID: 3190

SOURCES

db:CERT/CCid:VU#630531
db:BIDid:3190
db:JVNDBid:JVNDB-2001-000130
db:CNNVDid:CNNVD-200109-088
db:NVDid:CVE-2001-0506

LAST UPDATE DATE

2024-08-14T12:19:41.500000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#630531date:2002-07-13T00:00:00
db:BIDid:3190date:2001-08-15T00:00:00
db:JVNDBid:JVNDB-2001-000130date:2007-04-01T00:00:00
db:CNNVDid:CNNVD-200109-088date:2005-10-12T00:00:00
db:NVDid:CVE-2001-0506date:2018-10-30T16:25:10.357

SOURCES RELEASE DATE

db:CERT/CCid:VU#630531date:2002-07-13T00:00:00
db:BIDid:3190date:2001-08-15T00:00:00
db:JVNDBid:JVNDB-2001-000130date:2007-04-01T00:00:00
db:CNNVDid:CNNVD-200109-088date:2001-09-20T00:00:00
db:NVDid:CVE-2001-0506date:2001-09-20T04:00:00