CVE-2007-2815 – Microsoft IIS 5.1 - Hit Highlighting Authentication Bypass
https://notcve.org/view.php?id=CVE-2007-2815
The "hit-highlighting" functionality in webhits.dll in Microsoft Internet Information Services (IIS) Web Server 5.0 only uses Windows NT ACL configuration, which allows remote attackers to bypass NTLM and basic authentication mechanisms and access private web directories via the CiWebhitsfile parameter to null.htw. La funcionalidad "hit-highlighting" en la biblioteca webhits.dll en el Servidor web versión 5.0 de Internet Information Services (IIS) de Microsoft solo usa la configuración ACL de Windows NT, lo que permite a los atacantes remotos omitir los mecanismos de autenticación básicos y NTLM y acceder a los directorios web privados por medio del parámetro CiWebhitsfile en null.htw. • https://www.exploit-db.com/exploits/4016 http://osvdb.org/41091 http://securityreason.com/securityalert/2725 http://support.microsoft.com/kb/328832 http://www.securityfocus.com/archive/1/469238/100/0/threaded http://www.securityfocus.com/bid/24105 • CWE-264: Permissions, Privileges, and Access Controls •
CVE-2006-6578
https://notcve.org/view.php?id=CVE-2006-6578
Microsoft Internet Information Services (IIS) 5.1 permits the IUSR_Machine account to execute non-EXE files such as .COM files, which allows attackers to execute arbitrary commands via arguments to any .COM file that executes those arguments, as demonstrated using win.com when it is in a web directory with certain permissions. Microsoft Internet Information Services (IIS) 5.1 permite a la cuenta IUSR_Machine ejecutar archivos no-EXE así como archivos .COM, lo cual permite a un atacante remoto ejecutar comandos de su elección a través de argumentos a cualquier archivo .COM que ejecute esos argumentos, como se demostró usando win.com cuando está en un directorio web con ciertos permisos. • http://securityreason.com/securityalert/2036 http://www.securityfocus.com/archive/1/454268/100/0/threaded •
CVE-2006-6579
https://notcve.org/view.php?id=CVE-2006-6579
Microsoft Windows XP has weak permissions (FILE_WRITE_DATA and FILE_READ_DATA for Everyone) for %WINDIR%\pchealth\ERRORREP\QHEADLES, which allows local users to write and read files in this folder, as demonstrated by an ASP shell that has write access by IWAM_machine and read access by IUSR_Machine. Microsoft Windows XP tiene pérmisos débiles (FILE_WRITE_DATA y FILE_READ_DATA para cualquiera) para %WINDIR%\pchealth\ERRORREP\QHEADLES, lo cual permite a un usuario local escribir y leer archivos en esta carpeta, como se demostró con un shell ASP que tiene permisos de escritura por IWAM_machine y permiso de lectura por IUSR_Machine. • http://www.securityfocus.com/archive/1/454268/100/0/threaded •
CVE-2006-0026 – Microsoft IIS - ASP Stack Overflow (MS06-034)
https://notcve.org/view.php?id=CVE-2006-0026
Buffer overflow in Microsoft Internet Information Services (IIS) 5.0, 5.1, and 6.0 allows local and possibly remote attackers to execute arbitrary code via crafted Active Server Pages (ASP). Desbordamiento de búfer en Microsoft Internet Information Services (IIS) 5.0, 5.1, y 6.0 permite localmente y posiblemente a atacantes remotos ejecutar código de su elección a través de Active Server Pages (ASP) manipuladas. • https://www.exploit-db.com/exploits/2056 http://archives.neohapsis.com/archives/bugtraq/2006-07/0316.html http://secunia.com/advisories/21006 http://securitytracker.com/id?1016466 http://www.kb.cert.org/vuls/id/395588 http://www.osvdb.org/27152 http://www.securityfocus.com/bid/18858 http://www.us-cert.gov/cas/techalerts/TA06-192A.html http://www.vupen.com/english/advisories/2006/2752 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-034 •
CVE-2005-4360 – Microsoft IIS - HTTP Request Denial of Service
https://notcve.org/view.php?id=CVE-2005-4360
The URL parser in Microsoft Internet Information Services (IIS) 5.1 on Windows XP Professional SP2 allows remote attackers to execute arbitrary code via multiple requests to ".dll" followed by arguments such as "~0" through "~9", which causes ntdll.dll to produce a return value that is not correctly handled by IIS, as demonstrated using "/_vti_bin/.dll/*/~0". NOTE: the consequence was originally believed to be only a denial of service (application crash and reboot). • https://www.exploit-db.com/exploits/1376 https://www.exploit-db.com/exploits/1377 http://archive.cert.uni-stuttgart.de/bugtraq/2007/07/msg00254.html http://ingehenriksen.blogspot.com/2005/12/microsoft-iis-remote-dos-dll-url.html http://secunia.com/advisories/18106 http://securityreason.com/securityalert/271 http://securitytracker.com/alerts/2005/Dec/1015376.html http://www.osvdb.org/21805 http://www.securityfocus.com/archive/1/419707/100/0/threaded http://www.securityfocus. • CWE-252: Unchecked Return Value •