{"vuid":"VU#829845","idnumber":"829845","name":"Microsoft Windows 2000 Indexing Services enumerates local file locations via ixsso.query ActiveX object","keywords":["Indexing Service","ActiveX","ixsso.query","MS00-098","\"safe for scripting\""],"overview":"Index Server 2.0 and the Indexing Service 3.0 contain a vulnerability that may allow remote intruders to gain information about files on the local computer.","clean_desc":"Index Server 2.0 and Indexing Service 3.0 are services that allow information about local files to be queried via a web interface. Normally, this capability would only be available through the server, but the software includes an ActiveX control that is incorrectly marked safe-for-scripting. As a result, an remote attacker could gain information about files on a user's comuter when they view a malicious web page. The indexing service does not need to be running for the attacker to use the ActiveX control.","impact":"When a user views a malicious web page that invokes the vulnerable control, the web page author may be able to gain information about files on the victim's computer. This information includes the names and properties of existing files. If the indexing server is also running, the attacker may be able to gain information about which files contain keywords selected by the attacker.","resolution":"Apply a Patch Microsoft has published patches correcting this vulnerability. The patches are listed in their advisory at: http://www.microsoft.com/technet/security/bulletin/ms00-098.asp","workarounds":"","sysaffected":"","thanks":"Georgi Guninski discovered this vulnerability.","author":"This document was written by Cory F. Cohen.","public":["http://www.microsoft.com/technet/security/bulletin/ms00-098.asp","http://www.securityfocus.com/bid/1933","http://www.guninski.com/indexserv1-desc.html"],"cveids":["CVE-2000-1105"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2000-12-06T22:42:38Z","publicdate":"2000-11-10T00:00:00Z","datefirstpublished":"2002-09-27T17:46:20Z","dateupdated":"2002-09-27T17:46:23Z","revision":11,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"20","cam_exploitation":"0","cam_internetinfrastructure":"0","cam_population":"10","cam_impact":"8","cam_easeofexploitation":"18","cam_attackeraccessrequired":"15","cam_scorecurrent":"8.1","cam_scorecurrentwidelyknown":"8.1","cam_scorecurrentwidelyknownexploited":"16.2","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":8.1,"vulnote":null}