{"vuid":"VU#179012","idnumber":"179012","name":"Microsoft FrontPage Server Extensions contains denial of service vulnerability in the SmartHTML interpreter","keywords":["Microsoft","FrontPage Server Extensions","DoS","denial of service","consume all resources","invalid requests","Q813360","MS03-051"],"overview":"The Microsoft FrontPage Server Extensions contains a vulnerability that allows unauthenticated remote attackers to conduct denial of service attacks.","clean_desc":"Microsoft FrontPage Server Extensions (FPSE) is an optional set of tools that adds functionality to a web site. This functionality includes remote server administration, content updates, and a variety of site-specific tools such as searching support and form handling. According to MS03-051, FPSE is installed by default on Internet Information Server (IIS) 4.0, 5.0, and 5.1. The SmartHTML interpreter, a sub-component of FPSE, contains a denial of service vulnerability. According to Microsoft, a specially crafted request can cause the SmartHTML interpreter to enter a loop that will temporarily consume processor time and interrupt the normal operation of the server host.","impact":"This vulnerability allows unauthenticated remote attackers to conduct denial of service attacks against affected hosts.","resolution":"Apply a patch from Microsoft Microsoft has published Microsoft Security Bulletin MS03-051 to address this vulnerability. For a complete list of systems affected, please read the Microsoft bulletin.","workarounds":"Disable FrontPage Server Extensions As a an interim measure, sites may reduce their exposure to this vulnerability by disabling FrontPage Server Extensions. Note that this may reduce the functionality of sites that utilize FPSE extensions. Disable Internet Information Server The IIS web server is installed by default on several versions of Microsoft Windows. As a general rule, the CERT/CC recommends that system administrators disable or remove any nonessential software. In this case, IIS should be removed from any host that is not expected to serve web pages.","sysaffected":"","thanks":"","author":"This document was written by Jeffrey P. Lanza and is based upon information provided by Microsoft.","public":["http://www.microsoft.com/technet/security/bulletin/MS03-051.asp","http://www.secunia.com/advisories/10195/"],"cveids":["CVE-2003-0824"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2003-11-11T19:36:22Z","publicdate":"2003-11-11T00:00:00Z","datefirstpublished":"2003-11-14T19:43:59Z","dateupdated":"2003-11-14T19:44:04Z","revision":8,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"10","cam_exploitation":"10","cam_internetinfrastructure":"2","cam_population":"15","cam_impact":"5","cam_easeofexploitation":"5","cam_attackeraccessrequired":"20","cam_scorecurrent":"3.09375","cam_scorecurrentwidelyknown":"4.5","cam_scorecurrentwidelyknownexploited":"5.90625","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":3.09375,"vulnote":null}