{"vuid":"VU#412203","idnumber":"412203","name":"Microsoft Internet Information Server (IIS) vulnerable to DoS via malformed FTP connection status request","keywords":["Microsoft Internet Information Server","IIS","DoS","denial of service","malformed FTP connection status request","uninitialized data","access violation","MS02-018"],"overview":"A vulnerability in IIS could allow an intruder to disrupt ordinary operations of both  FTP and Web services on vulnerable IIS servers.","clean_desc":"IIS includes an FTP server. An intruder who sends a malformed request for the status of an existing connection could cause the IIS server to fail, resulting in the loss of both FTP service and HTTP service. In order to be able to issue the status request, an intruder needs an existing FTP session, which means he either has to have login credentials or anonymous FTP access to a vulnerable system. (Theoretically, an intruder may also be able to exploit this vulnerability by injecting data into an existing FTP session through ISN prediction or other techniques. )  For more information, see Microsoft Security Bulletin MS02-018.","impact":"Intruders can halt the operation of vulnerable IIS servers. On IIS 5.0 and IIS 5.1, IIS will automatically restart, though the intruder may be able to repeat the attack indefinitely. On IIS 4.0, IIS has to be manually restarted.","resolution":"Apply a patch as described in MS02-018.","workarounds":"","sysaffected":"","thanks":"Our thanks to Microsoft Corporation, upon whose \nadvisory\n this document is based.","author":"This document was written by Shawn V. Hernan.","public":["h","t","t","p",":","/","/","w","w","w",".","m","i","c","r","o","s","o","f","t",".","c","o","m","/","t","e","c","h","n","e","t","/","s","e","c","u","r","i","t","y","/","b","u","l","l","e","t","i","n","/","M","S","0","2","-","0","1","8",".","a","s","p"],"cveids":["CVE-2002-0073"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2002-04-10T16:04:42Z","publicdate":"2002-04-10T00:00:00Z","datefirstpublished":"2002-04-10T21:05:44Z","dateupdated":"2002-04-10T21:05:47Z","revision":5,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"17","cam_population":"15","cam_impact":"8","cam_easeofexploitation":"20","cam_attackeraccessrequired":"17","cam_scorecurrent":"24.48","cam_scorecurrentwidelyknown":"28.305","cam_scorecurrentwidelyknownexploited":"43.605","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":24.48,"vulnote":null}