ID

VAR-201009-0051


CVE

CVE-2010-1899


TITLE

Microsoft Internet Information Services of ASP Service disruption in implementation (DoS) Vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2010-002096

DESCRIPTION

Stack consumption vulnerability in the ASP implementation in Microsoft Internet Information Services (IIS) 5.1, 6.0, 7.0, and 7.5 allows remote attackers to cause a denial of service (daemon outage) via a crafted request, related to asp.dll, aka "IIS Repeated Parameter Request Denial of Service Vulnerability.". Microsoft IIS is prone to a remote denial-of-service vulnerability. An attacker can exploit this issue to force the affected application to become unresponsive, denying service to legitimate users. This issue affects IIS 5.1, 6.0, 7.0, and 7.5. ---------------------------------------------------------------------- Windows Applications Insecure Library Loading The Official, Verified Secunia List: http://secunia.com/advisories/windows_insecure_library_loading/ The list is continuously updated as we confirm the vulnerability reports so check back regularly too see if any of your apps are affected. ---------------------------------------------------------------------- TITLE: Microsoft IIS Repeated Parameter Request Denial of Service SECUNIA ADVISORY ID: SA41399 VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/41399/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=41399 RELEASE DATE: 2010-09-15 DISCUSS ADVISORY: http://secunia.com/advisories/41399/#comments AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s) http://secunia.com/advisories/41399/ ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS https://ca.secunia.com/?page=viewadvisory&vuln_id=41399 ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/ DESCRIPTION: A vulnerability has been reported in Internet Information Services, which can be exploited by malicious people to cause a DoS (Denial of Service). The vulnerability is caused due to a stack overflow error in the script processing code when handling repeated parameter requests. This can be exploited to crash the service via specially crafted requests to hosted ASP scripts, which write parameters from the request in the response. SOLUTION: Apply patches. Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ PROVIDED AND/OR DISCOVERED BY: The vendor credits Jinsik Shim. ORIGINAL ADVISORY: MS10-065 (KB2124261, KB2267960): http://www.microsoft.com/technet/security/bulletin/ms10-065.mspx OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ DEEP LINKS: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ EXPLOIT: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ---------------------------------------------------------------------- . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 National Cyber Alert System Technical Cyber Security Alert TA10-257A Microsoft Updates for Multiple Vulnerabilities Original release date: September 14, 2010 Last revised: -- Source: US-CERT Systems Affected * Microsoft Windows * Microsoft Office Overview There are multiple vulnerabilities in Microsoft Windows and Microsoft Office. Microsoft has released updates to address these vulnerabilities. I. Description The Microsoft Security Bulletin Summary for September 2010 describes multiple vulnerabilities in Microsoft Windows and Microsoft Office. Microsoft has released updates to address the vulnerabilities. II. Impact A remote, unauthenticated attacker could execute arbitrary code or cause a vulnerable system or application to crash. III. Solution Apply updates Microsoft has provided updates for these vulnerabilities in the Microsoft Security Bulletin Summary for September 2010. That bulletin describes any known issues related to the updates. Administrators are encouraged to note these issues and test for any potentially adverse effects. In addition, administrators should consider using an automated update distribution system such as Windows Server Update Services (WSUS). IV. References * Microsoft Security Bulletin Summary for September 2010 - <http://www.microsoft.com/technet/security/bulletin/ms10-sep.mspx> * Microsoft Windows Server Update Services - <http://technet.microsoft.com/en-us/wsus/default.aspx> ____________________________________________________________________ The most recent version of this document can be found at: <http://www.us-cert.gov/cas/techalerts/TA10-257A.html> ____________________________________________________________________ Feedback can be directed to US-CERT Technical Staff. Please send email to <cert@cert.org> with "TA10-257A Feedback VU#447990" in the subject. ____________________________________________________________________ For instructions on subscribing to or unsubscribing from this mailing list, visit <http://www.us-cert.gov/cas/signup.html>. ____________________________________________________________________ Produced 2010 by US-CERT, a government organization. Terms of use: <http://www.us-cert.gov/legal.html> ____________________________________________________________________ Revision History September 14, 2010: Initial release -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.5 (GNU/Linux) iQEVAwUBTI/u6T6pPKYJORa3AQKfgQgAsBDEHMH+Dq73qHFwsGnUIBWi7DkAV64s 0tz109GDGQRXL/MkXwWfaFfDc+h4ZUgjfVv93GBjK0NI78mYOWxSS7Pd3WhD6TaH YFcDcF4IW06Er4wEjgR+y5fTvF17k3Cix0GdsVzet/I2XMd4uCnIrHyLzLgZhf5s sWtv+kLaqCKUl8zsmcpmTcKUt+V2U3VWGeICIwuZXjB8FNHWuzYN1r/togFt0tcA 16gtGSCmdJy6Er+FyXxTJvWX4uJywBTDtIZZY/xyhGp2dBWUdOfY1k+7C5Dp/tCY Rq9tOY6caxHUYmitTtABaop83jTJFnS53lQJo4UizDNQoNbRSUIVFA== =dDpT -----END PGP SIGNATURE-----

Trust: 2.16

sources: NVD: CVE-2010-1899 // JVNDB: JVNDB-2010-002096 // BID: 43140 // VULMON: CVE-2010-1899 // PACKETSTORM: 93847 // PACKETSTORM: 93868

AFFECTED PRODUCTS

vendor:microsoftmodel:iisscope:eqversion:7.5

Trust: 1.7

vendor:microsoftmodel:iisscope:eqversion:7.0

Trust: 1.7

vendor:microsoftmodel:iisscope:eqversion:5.1

Trust: 1.7

vendor:microsoftmodel:iisscope:eqversion:6.0

Trust: 1.4

vendor:microsoftmodel:internet information servicesscope:eqversion:7.5

Trust: 1.0

vendor:microsoftmodel:internet information serverscope:eqversion:6.0

Trust: 1.0

vendor:microsoftmodel:windows 7scope:eqversion:(x32)

Trust: 0.8

vendor:microsoftmodel:windows 7scope:eqversion:(x64)

Trust: 0.8

vendor:microsoftmodel:windows server 2003scope:eqversion:none

Trust: 0.8

vendor:microsoftmodel:windows server 2003scope:eqversion:(itanium)

Trust: 0.8

vendor:microsoftmodel:windows server 2003scope:eqversion:(x64)

Trust: 0.8

vendor:microsoftmodel:windows server 2008scope:eqversion:(itanium)

Trust: 0.8

vendor:microsoftmodel:windows server 2008scope:eqversion:(x64)

Trust: 0.8

vendor:microsoftmodel:windows server 2008scope:eqversion:(x86)

Trust: 0.8

vendor:microsoftmodel:windows server 2008scope:eqversion:r2(itanium)

Trust: 0.8

vendor:microsoftmodel:windows server 2008scope:eqversion:r2(x64)

Trust: 0.8

vendor:microsoftmodel:windows vistascope:eqversion:none

Trust: 0.8

vendor:microsoftmodel:windows vistascope:eqversion:(x64)

Trust: 0.8

vendor:microsoftmodel:windows xpscope:eqversion:(x64)

Trust: 0.8

vendor:microsoftmodel:windows xpscope:eqversion:sp3

Trust: 0.8

vendor:avayamodel:messaging application server mmscope:eqversion:3.1

Trust: 0.3

vendor:avayamodel:messaging application server mmscope:eqversion:3.0

Trust: 0.3

vendor:avayamodel:messaging application server mmscope:eqversion:2.0

Trust: 0.3

vendor:avayamodel:messaging application server mmscope:eqversion:1.1

Trust: 0.3

vendor:avayamodel:messaging application serverscope:eqversion:5

Trust: 0.3

vendor:avayamodel:messaging application serverscope:eqversion:4

Trust: 0.3

vendor:avayamodel:messaging application serverscope:eqversion:0

Trust: 0.3

vendor:avayamodel:meeting exchange webportalscope:eqversion:-0

Trust: 0.3

vendor:avayamodel:meeting exchange web conferencing serverscope:eqversion:-0

Trust: 0.3

vendor:avayamodel:meeting exchange streaming serverscope:eqversion:-0

Trust: 0.3

vendor:avayamodel:meeting exchange recording serverscope:eqversion:-0

Trust: 0.3

vendor:avayamodel:meeting exchange client registration serverscope:eqversion:-0

Trust: 0.3

vendor:avayamodel:callpilot unified messagingscope:eqversion:0

Trust: 0.3

vendor:avayamodel:aura conferencing standardscope:eqversion:6.0

Trust: 0.3

sources: BID: 43140 // JVNDB: JVNDB-2010-002096 // CNNVD: CNNVD-201009-126 // NVD: CVE-2010-1899

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2010-1899
value: MEDIUM

Trust: 1.0

NVD: CVE-2010-1899
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201009-126
value: MEDIUM

Trust: 0.6

VULMON: CVE-2010-1899
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2010-1899
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

sources: VULMON: CVE-2010-1899 // JVNDB: JVNDB-2010-002096 // CNNVD: CNNVD-201009-126 // NVD: CVE-2010-1899

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.8

sources: JVNDB: JVNDB-2010-002096 // NVD: CVE-2010-1899

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201009-126

TYPE

buffer error

Trust: 0.6

sources: CNNVD: CNNVD-201009-126

CONFIGURATIONS

sources: JVNDB: JVNDB-2010-002096

EXPLOIT AVAILABILITY

sources: VULMON: CVE-2010-1899

PATCH

title:MS10-065url:http://www.microsoft.com/technet/security/bulletin/MS10-065.mspx

Trust: 0.8

title:MS10-065url:http://www.microsoft.com/japan/technet/security/bulletin/ms10-065.mspx

Trust: 0.8

title:MS10-065eurl:http://www.microsoft.com/japan/security/bulletins/MS10-065e.mspx

Trust: 0.8

title:TA10-257Aurl:http://software.fujitsu.com/jp/security/vulnerabilities/ta10-257a.html

Trust: 0.8

title:Security Update for Windows XP (KB2124261)url:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=34185

Trust: 0.6

title:Security Update for Windows Server 2003 for Itanium-based Systems (KB2124261)url:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=34188

Trust: 0.6

title:Security Update for Windows 7 (KB2124261)url:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=34192

Trust: 0.6

title:Security Update for Windows Server 2003 (KB2124261)url:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=34187

Trust: 0.6

title:Security Update for Windows Server 2008 for Itanium-based Systems (KB2124261)url:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=34191

Trust: 0.6

title:cvemapurl:https://github.com/t3l3machus/cvemap

Trust: 0.1

title:WindowsElevationurl:https://github.com/Al1ex/WindowsElevation

Trust: 0.1

title:WindowsElevationurl:https://github.com/fei9747/WindowsElevation

Trust: 0.1

sources: VULMON: CVE-2010-1899 // JVNDB: JVNDB-2010-002096 // CNNVD: CNNVD-201009-126

EXTERNAL IDS

db:NVDid:CVE-2010-1899

Trust: 2.8

db:BIDid:43140

Trust: 1.1

db:SECUNIAid:41399

Trust: 0.9

db:USCERTid:TA10-257A

Trust: 0.9

db:VUPENid:ADV-2010-2386

Trust: 0.8

db:USCERTid:SA10-257A

Trust: 0.8

db:JVNDBid:JVNDB-2010-002096

Trust: 0.8

db:CNNVDid:CNNVD-201009-126

Trust: 0.6

db:EXPLOIT-DBid:15167

Trust: 0.1

db:VULMONid:CVE-2010-1899

Trust: 0.1

db:PACKETSTORMid:93847

Trust: 0.1

db:PACKETSTORMid:93868

Trust: 0.1

sources: VULMON: CVE-2010-1899 // BID: 43140 // JVNDB: JVNDB-2010-002096 // PACKETSTORM: 93847 // PACKETSTORM: 93868 // CNNVD: CNNVD-201009-126 // NVD: CVE-2010-1899

REFERENCES

url:https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a7127

Trust: 1.7

url:https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-065

Trust: 1.7

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-1899

Trust: 0.8

url:http://www.jpcert.or.jp/at/2010/at100023.txt

Trust: 0.8

url:http://jvn.jp/cert/jvnta10-257a/index.html

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2010-1899

Trust: 0.8

url:http://secunia.com/advisories/41399

Trust: 0.8

url:http://www.securityfocus.com/bid/43140

Trust: 0.8

url:http://www.us-cert.gov/cas/alerts/sa10-257a.html

Trust: 0.8

url:http://www.us-cert.gov/cas/techalerts/ta10-257a.html

Trust: 0.8

url:http://www.vupen.com/english/advisories/2010/2386

Trust: 0.8

url:http://www.npa.go.jp/cyberpolice/#topics

Trust: 0.8

url:http://www.microsoft.com/technet/security/bulletin/ms10-065.mspx

Trust: 0.4

url:http://www.microsoft.com/windowsserver2003/iis/default.mspx

Trust: 0.3

url:http://support.avaya.com/css/p8/documents/100110750

Trust: 0.3

url:https://cwe.mitre.org/data/definitions/119.html

Trust: 0.1

url:http://tools.cisco.com/security/center/viewalert.x?alertid=21313

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://www.exploit-db.com/exploits/15167/

Trust: 0.1

url:https://www.rapid7.com/db/modules/auxiliary/dos/windows/http/ms10_065_ii6_asp_dos

Trust: 0.1

url:http://secunia.com/products/corporate/evm/

Trust: 0.1

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=41399

Trust: 0.1

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

Trust: 0.1

url:http://secunia.com/advisories/41399/#comments

Trust: 0.1

url:http://secunia.com/advisories/windows_insecure_library_loading/

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/personal/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/advisories/41399/

Trust: 0.1

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.1

url:http://www.us-cert.gov/cas/techalerts/ta10-257a.html>

Trust: 0.1

url:http://www.microsoft.com/technet/security/bulletin/ms10-sep.mspx>

Trust: 0.1

url:http://www.us-cert.gov/cas/signup.html>.

Trust: 0.1

url:http://www.us-cert.gov/legal.html>

Trust: 0.1

url:http://technet.microsoft.com/en-us/wsus/default.aspx>

Trust: 0.1

sources: VULMON: CVE-2010-1899 // BID: 43140 // JVNDB: JVNDB-2010-002096 // PACKETSTORM: 93847 // PACKETSTORM: 93868 // CNNVD: CNNVD-201009-126 // NVD: CVE-2010-1899

CREDITS

Jinsik Shim

Trust: 0.9

sources: BID: 43140 // CNNVD: CNNVD-201009-126

SOURCES

db:VULMONid:CVE-2010-1899
db:BIDid:43140
db:JVNDBid:JVNDB-2010-002096
db:PACKETSTORMid:93847
db:PACKETSTORMid:93868
db:CNNVDid:CNNVD-201009-126
db:NVDid:CVE-2010-1899

LAST UPDATE DATE

2024-11-23T21:47:15.139000+00:00


SOURCES UPDATE DATE

db:VULMONid:CVE-2010-1899date:2021-02-05T00:00:00
db:BIDid:43140date:2010-10-01T19:30:00
db:JVNDBid:JVNDB-2010-002096date:2010-10-05T00:00:00
db:CNNVDid:CNNVD-201009-126date:2019-07-08T00:00:00
db:NVDid:CVE-2010-1899date:2024-11-21T01:15:25.337

SOURCES RELEASE DATE

db:VULMONid:CVE-2010-1899date:2010-09-15T00:00:00
db:BIDid:43140date:2010-09-14T00:00:00
db:JVNDBid:JVNDB-2010-002096date:2010-10-05T00:00:00
db:PACKETSTORMid:93847date:2010-09-14T06:20:47
db:PACKETSTORMid:93868date:2010-09-15T03:00:39
db:CNNVDid:CNNVD-201009-126date:2010-09-17T00:00:00
db:NVDid:CVE-2010-1899date:2010-09-15T19:00:18.790