ID

VAR-200310-0075


CVE

CVE-2003-0702


TITLE

ISS RealSecure Server Sensor In URL request Service disruption due to incomplete processing (DoS) Vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2003-000263

DESCRIPTION

Unknown vulnerability in an ISAPI plugin for ISS Server Sensor 7.0 XPU 20.16, 20.18, and possibly other versions before 20.19, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code in Internet Information Server (IIS) via a certain URL through SSL. This vulnerability could be exploited to crash the underlying Microsoft IIS web server. It should be noted that the service may be automatically restarted. It is not known if this issue affects other platforms or can be exploited to crash other underlying web server implementations. The researchers who discovered this vulnerability are currently investigating the possibility of exploiting this issue to execute arbitrary code, though sufficient details are not available regarding this at the time of writing. This BID will be updated if more details become available. RealSecure Server Sensor is a set of intrusion detection and immediate response system based on host-base and network-base. Remote attackers can exploit this vulnerability to perform denial-of-service attacks on services. It's unclear if other platforms are affected by the vulnerability. [enteredgelogo.jpg] EnterEdge Technology takes a holistic approach to ensuring the Confidentiality, Integrity and Availability of data. By combining best-of-breed technology with security expertise, education and managed security services, EnterEdge helps organizations lower costs and improve efficiencies. By simply sending a properly formatted URL via SSL, the ISAPI filter will crash IIS shutting down the service entirely. We are currently testing this vulnerability in XPU 20.16 and 20.18 for remote code execution or code redirection. We contacted ISS on or about August 14th concerning this issue. ISS has since released XPU 20.19 which addresses this specific issue. Credit: EnterEdge Technology, LLC Copyright (c) 1998-2003 EnterEdge Technology Permission is hereby granted for the redistribution of this alert electronically. It is not to be edited in any way without express consent of EnterEdge Technology. If you wish to reprint the whole or any part of this alert in any other medium excluding electronic medium, please e-mail research@enteredge.com for permission. Disclaimer The information within this paper may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties with regard to this information. In no event shall the author be liable for any damages whatsoever arising out of or in connection with the use or spread of this information. Any use of this information is at the user's own risk. Feedback Please send suggestions, updates, and comments to: research@enteredge.com EnterEdge Technology http://www.enteredge.com Copyright \xa9 2001 EnterEdge Technology, LLC 5500 Interstate N. Pkwy Suite 440 Atlanta, GA 30328 Phone: 770.955.9899 Fax 770.955.9896

Trust: 2.07

sources: NVD: CVE-2003-0702 // JVNDB: JVNDB-2003-000263 // BID: 8550 // VULHUB: VHN-7527 // PACKETSTORM: 31598

AFFECTED PRODUCTS

vendor:issmodel:realsecure server sensorscope:eqversion:7.0

Trust: 1.6

vendor:the internet securitymodel:realsecure server sensorscope:eqversion:7.0

Trust: 0.8

vendor:internetmodel:security systems realsecure server sensor xpuscope:eqversion:7.020.18

Trust: 0.3

vendor:internetmodel:security systems realsecure server sensor xpuscope:eqversion:7.020.16

Trust: 0.3

vendor:internetmodel:security systems realsecure server sensor xpuscope:neversion:7.020.19

Trust: 0.3

sources: BID: 8550 // JVNDB: JVNDB-2003-000263 // CNNVD: CNNVD-200310-041 // NVD: CVE-2003-0702

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2003-0702
value: MEDIUM

Trust: 1.0

NVD: CVE-2003-0702
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-200310-041
value: MEDIUM

Trust: 0.6

VULHUB: VHN-7527
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2003-0702
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-7527
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-7527 // JVNDB: JVNDB-2003-000263 // CNNVD: CNNVD-200310-041 // NVD: CVE-2003-0702

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

sources: NVD: CVE-2003-0702

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200310-041

TYPE

other

Trust: 0.6

sources: CNNVD: CNNVD-200310-041

CONFIGURATIONS

sources: JVNDB: JVNDB-2003-000263

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-7527

PATCH

title:Top Pageurl:http://www.isskk.co.jp/

Trust: 0.8

sources: JVNDB: JVNDB-2003-000263

EXTERNAL IDS

db:NVDid:CVE-2003-0702

Trust: 2.9

db:XFid:13088

Trust: 1.4

db:BIDid:8550

Trust: 1.2

db:JVNDBid:JVNDB-2003-000263

Trust: 0.8

db:CNNVDid:CNNVD-200310-041

Trust: 0.7

db:BUGTRAQid:20030905 ISS SERVER SENSOR DENIAL OF SERVICE

Trust: 0.6

db:PACKETSTORMid:31598

Trust: 0.2

db:VULHUBid:VHN-7527

Trust: 0.1

sources: VULHUB: VHN-7527 // BID: 8550 // JVNDB: JVNDB-2003-000263 // PACKETSTORM: 31598 // CNNVD: CNNVD-200310-041 // NVD: CVE-2003-0702

REFERENCES

url:http://www.enteredge.com/research/can-2003-0702.asp

Trust: 1.7

url:http://xforce.iss.net/xforce/xfdb/13088

Trust: 1.4

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/13088

Trust: 1.1

url:http://marc.info/?l=bugtraq&m=106278164225389&w=2

Trust: 1.0

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2003-0702

Trust: 0.8

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2003-0702

Trust: 0.8

url:http://www.securityfocus.com/bid/8550

Trust: 0.8

url:http://marc.theaimsgroup.com/?l=bugtraq&m=106278164225389&w=2

Trust: 0.6

url:http://www.iss.net/products_services/enterprise_protection/rsserver/protector_server.php

Trust: 0.3

url:/archive/1/336307

Trust: 0.3

url:http://marc.info/?l=bugtraq&m=106278164225389&w=2

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2003-0702

Trust: 0.1

url:http://www.enteredge.com

Trust: 0.1

sources: VULHUB: VHN-7527 // BID: 8550 // JVNDB: JVNDB-2003-000263 // PACKETSTORM: 31598 // CNNVD: CNNVD-200310-041 // NVD: CVE-2003-0702

CREDITS

EnterEdge Technology

Trust: 0.6

sources: CNNVD: CNNVD-200310-041

SOURCES

db:VULHUBid:VHN-7527
db:BIDid:8550
db:JVNDBid:JVNDB-2003-000263
db:PACKETSTORMid:31598
db:CNNVDid:CNNVD-200310-041
db:NVDid:CVE-2003-0702

LAST UPDATE DATE

2024-08-14T14:23:07.118000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-7527date:2017-07-11T00:00:00
db:BIDid:8550date:2009-07-11T23:56:00
db:JVNDBid:JVNDB-2003-000263date:2007-04-01T00:00:00
db:CNNVDid:CNNVD-200310-041date:2005-10-20T00:00:00
db:NVDid:CVE-2003-0702date:2017-07-11T01:29:35.337

SOURCES RELEASE DATE

db:VULHUBid:VHN-7527date:2003-10-20T00:00:00
db:BIDid:8550date:2003-09-05T00:00:00
db:JVNDBid:JVNDB-2003-000263date:2007-04-01T00:00:00
db:PACKETSTORMid:31598date:2003-09-09T03:28:46
db:CNNVDid:CNNVD-200310-041date:2003-09-04T00:00:00
db:NVDid:CVE-2003-0702date:2003-10-20T04:00:00