{"vuid":"VU#279156","idnumber":"279156","name":"Microsoft FrontPage Server Extensions contains buffer overflow in remote debugging functionality","keywords":["Microsoft","FrontPage Server Extensions","buffer overflow","debug functionality","Q813360","MS03-051"],"overview":"Microsoft FrontPage Server Extensions contains a vulnerability that allows remote attackers to execute arbitrary code with local system privileges.","clean_desc":"Microsoft FrontPage Server Extensions (FPSE) is an optional set of tools that adds functionality to a web site. This functionality includes remote server administration, content updates, and a variety of site-specific tools such as searching support and form handling. According to MS03-051, FPSE is installed by default on Internet Information Server (IIS) 4.0, 5.0, and 5.1. The FPSE contains a buffer overflow vulnerability in its support of remote debugging. This vulnerability can be exploited by an unauthenticated remote attacker and allows arbitrary code to be executed with local system privileges.","impact":"This vulnerability allows unauthenticated remote attackers to execute arbitrary code with local system privileges.","resolution":"Apply a patch from Microsoft Microsoft has published Microsoft Security Bulletin MS03-051 to address this vulnerability. For a complete list of systems affected, please read the Microsoft bulletin.","workarounds":"Disable FrontPage Server Extensions As a an interim measure, sites may reduce their exposure to this vulnerability by disabling FrontPage Server Extensions. Note that this may reduce the functionality of sites that utilize FPSE extensions. Disable Internet Information Server The IIS web server is installed by default on several versions of Microsoft Windows. As a general rule, the CERT/CC recommends that system administrators disable or remove any nonessential software. In this case, IIS should be removed from any host that is not expected to serve web pages.","sysaffected":"","thanks":"This vulnerability was reported to Microsoft by Brett More of \nSecurity-Assessment.com","author":"This document was written by Jeffrey P. Lanza and is based upon information provided by Microsoft.","public":["http://www.microsoft.com/technet/security/bulletin/MS03-051.asp","http://www.secunia.com/advisories/10195/"],"cveids":["CVE-2003-0822"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2003-11-11T19:36:19Z","publicdate":"2003-11-11T00:00:00Z","datefirstpublished":"2003-11-12T23:19:37Z","dateupdated":"2003-11-14T19:39:53Z","revision":18,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"20","cam_exploitation":"10","cam_internetinfrastructure":"1","cam_population":"15","cam_impact":"20","cam_easeofexploitation":"15","cam_attackeraccessrequired":"20","cam_scorecurrent":"52.3125","cam_scorecurrentwidelyknown":"52.3125","cam_scorecurrentwidelyknownexploited":"69.1875","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":52.3125,"vulnote":null}