{"vuid":"VU#630531","idnumber":"630531","name":"Microsoft Internet Information Server (IIS) vulnerable to buffer overflow via malformed server-side include directive","keywords":["Microsoft Internet Information Server","IIS","SSI","malformed server-side include directive","buffer overflow","ssinc.dll","MS01-044"],"overview":"A buffer overflow in the code that processes server-side include files on IIS 4.0 and IIS 5.0 could allow an intruder to execute code with the privileges of the web server.","clean_desc":"A buffer overflow exists in the code that processes server side include directives on IIS versions 4 and 5. An intruder who can create or modify files on the web server can subsequently use this buffer overflow to execute arbitrary code with the privileges of the web server. Quoting from Microsoft Security Bulletin MS01-044: A buffer overrun vulnerability involving the code that performs server-side include (SSI) directives. An attacker who had the ability to place content onto a server could include a malformed SSI directive that, when the content was processed, would result in code of the attacker’s choice running in Local System context. Under ordinary circumstances, only web administrators would be able to create or modify the necessary files.","impact":"An intruder can execute arbitrary code with the privileges of the web server.","resolution":"Apply a patch as described in http://www.microsoft.com/technet/treeview/default.asp?url=/technet/security/bulletin/MS01-044.asp. Alternately, Microsoft has indicated this issue will be addressed in Windows 2000 service pack 3.","workarounds":"","sysaffected":"","thanks":"Thanks to the NSFocus Team for reporting this vulnerability and to Microsoft for the information contained in their bulletin.","author":"This document was written by Shawn V Hernan.","public":["http://www.microsoft.com/technet/security/bulletin/MS01-044.asp","http://support.microsoft.com/default.aspx?scid=kb;en-us;Q301625","http://www.securityfocus.com/bid/3190"],"cveids":["CVE-2001-0506"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2001-08-16T14:14:07Z","publicdate":"2001-08-15T00:00:00Z","datefirstpublished":"2002-07-13T19:10:04Z","dateupdated":"2002-07-13T21:36:32Z","revision":12,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"10","cam_population":"15","cam_impact":"20","cam_easeofexploitation":"18","cam_attackeraccessrequired":"5","cam_scorecurrent":"12.65625","cam_scorecurrentwidelyknown":"15.1875","cam_scorecurrentwidelyknownexploited":"25.3125","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":12.65625,"vulnote":null}