CVE-2002-0073
CVSS5.0
发布时间 :2002-04-22 00:00:00
修订时间 :2016-10-17 22:15:53
NMCOS    

[原文]The FTP service in Internet Information Server (IIS) 4.0, 5.0 and 5.1 allows attackers who have established an FTP session to cause a denial of service via a specially crafted status request containing glob characters.


[CNNVD]Microsoft FTP服务程序STAT glob()扩展拒绝服务攻击漏洞(CNNVD-200204-017)

        
        Microsoft IIS(Internet Information Server)是MS Windows系统默认自带的Web服务器软件,其中默认包含FTP服务。
        Microsoft的FTP服务在处理STAT命令时存在问题,可导致攻击者进行拒绝服务攻击。
        任何合法帐户或者匿名帐户可以在登录FTP服务程序后,提交包含各种文件扩展字符的随机数据为参数的STAT命令,可导致访问冲突产生,所有运行在inetinfo.exe进程下的服务会终止。
        成功地利用这个漏洞,对于IIS 4.0其会产生拒绝服务,需要手工重新启动;对于IIS 5.0系统会自动重新启动。
        

- CVSS (基础分值)

CVSS分值: 5 [中等(MEDIUM)]
机密性影响: [--]
完整性影响: [--]
可用性影响: [--]
攻击复杂度: [--]
攻击向量: [--]
身份认证: [--]

- CPE (受影响的平台与产品)

cpe:/a:microsoft:internet_information_server:5.1Microsoft IIS 5.1
cpe:/a:microsoft:internet_information_server:5.0
cpe:/a:microsoft:internet_information_server:4.0Microsoft IIS 4.0

- OVAL (用于检测的技术细节)

oval:org.mitre.oval:def:35DEPRECATED: Windows 2000 IIS FTP Connection Status Request Denial of Service
oval:org.mitre.oval:def:24DEPRECATED: Windows NT IIS FTP Connection Status Request Denial of Service
oval:org.mitre.oval:def:12490Denial of service via FTP status request
*OVAL详细的描述了检测该漏洞的方法,你可以从相关的OVAL定义中找到更多检测该漏洞的技术细节。

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0073
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2002-0073
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200204-017
(官方数据源) CNNVD

- 其它链接及资源

http://archives.neohapsis.com/archives/vulnwatch/2002-q2/0023.html
(UNKNOWN)  VULNWATCH  20020416 [VulnWatch] Microsoft FTP Service STAT Globbing DoS
http://marc.info/?l=bugtraq&m=101901273810598&w=2
(UNKNOWN)  BUGTRAQ  20020417 Microsoft FTP Service STAT Globbing DoS
http://www.cert.org/advisories/CA-2002-09.html
(UNKNOWN)  CERT  CA-2002-09
http://www.cisco.com/warp/public/707/Microsoft-IIS-vulnerabilities-MS02-018.shtml
(UNKNOWN)  CISCO  20020415 Microsoft IIS Vulnerabilities in Cisco Products - MS02-018
http://www.digitaloffense.net/msftpd/advisory.txt
(UNKNOWN)  MISC  http://www.digitaloffense.net/msftpd/advisory.txt
http://www.iss.net/security_center/static/8801.php
(UNKNOWN)  XF  iis-ftp-session-status-dos(8801)
http://www.kb.cert.org/vuls/id/412203
(UNKNOWN)  CERT-VN  VU#412203
http://www.microsoft.com/technet/security/bulletin/ms02-018.asp
(VENDOR_ADVISORY)  MS  MS02-018
http://www.securityfocus.com/bid/4482
(UNKNOWN)  BID  4482

- 漏洞信息

Microsoft FTP服务程序STAT glob()扩展拒绝服务攻击漏洞
中危 其他
2002-04-22 00:00:00 2005-05-02 00:00:00
远程  
        
        Microsoft IIS(Internet Information Server)是MS Windows系统默认自带的Web服务器软件,其中默认包含FTP服务。
        Microsoft的FTP服务在处理STAT命令时存在问题,可导致攻击者进行拒绝服务攻击。
        任何合法帐户或者匿名帐户可以在登录FTP服务程序后,提交包含各种文件扩展字符的随机数据为参数的STAT命令,可导致访问冲突产生,所有运行在inetinfo.exe进程下的服务会终止。
        成功地利用这个漏洞,对于IIS 4.0其会产生拒绝服务,需要手工重新启动;对于IIS 5.0系统会自动重新启动。
        

- 公告与补丁

        临时解决方法:
        如果您不能立刻安装补丁或者升级,CNNVD建议您采取以下措施以降低威胁:
        * 暂时没有合适的临时解决方法。
        厂商补丁:
        Microsoft
        ---------
        目前厂商还没有提供补丁或者升级程序,我们建议使用此软件的用户随时关注厂商的主页以获取最新版本:
        
        http://www.microsoft.com/

- 漏洞信息

3328
Microsoft IIS FTP Status Request DoS
Remote / Network Access Denial of Service
Loss of Availability
Exploit Public

- 漏洞描述

IIS contains a flaw that may allow a remote denial of service. The issue is triggered by a status request which creates an error condition which is not correctly reported. Other FTP daemon code will attempt to utilize the uninitialized data which causes an access violation. This results not only in loss of availability for the FTP service, but other web services as well.

- 时间线

2002-04-10 2002-04-10
2002-04-10 Unknow

- 解决方案

Install Patch Q319733, as it has been reported to fix this vulnerability. It is also possible to correct the flaw by implementing the following workaround: Disable FTP - The IIS Lockdown Tool disables FTP by default.

- 相关参考

- 漏洞作者

- 漏洞信息

Microsoft IIS FTP Connection Status Request Denial of Service Vulnerability
Failure to Handle Exceptional Conditions 4482
Yes No
2002-04-10 12:00:00 2009-07-11 11:56:00
This vulnerability was discovered by H D Moore.

- 受影响的程序版本

Microsoft IIS 5.1
- Microsoft Windows 2000 Advanced Server SP2
- Microsoft Windows 2000 Advanced Server SP1
- Microsoft Windows 2000 Advanced Server
- Microsoft Windows 2000 Datacenter Server SP2
- Microsoft Windows 2000 Datacenter Server SP1
- Microsoft Windows 2000 Datacenter Server
- Microsoft Windows 2000 Professional SP2
- Microsoft Windows 2000 Professional SP1
- Microsoft Windows 2000 Professional
- Microsoft Windows 2000 Server SP2
- Microsoft Windows 2000 Server SP1
- Microsoft Windows 2000 Server
+ Microsoft Windows XP 64-bit Edition SP1
+ Microsoft Windows XP 64-bit Edition
+ Microsoft Windows XP 64-bit Edition
- Microsoft Windows XP Home SP1
- Microsoft Windows XP Home SP1
- Microsoft Windows XP Home
- Microsoft Windows XP Home
+ Microsoft Windows XP Professional SP1
+ Microsoft Windows XP Professional SP1
+ Microsoft Windows XP Professional
+ Microsoft Windows XP Professional
Microsoft IIS 5.0
- Microsoft Windows 2000 Advanced Server SP2
- Microsoft Windows 2000 Advanced Server SP2
- Microsoft Windows 2000 Advanced Server SP1
- Microsoft Windows 2000 Advanced Server SP1
+ Microsoft Windows 2000 Advanced Server
+ Microsoft Windows 2000 Advanced Server
- Microsoft Windows 2000 Datacenter Server SP2
- Microsoft Windows 2000 Datacenter Server SP2
- Microsoft Windows 2000 Datacenter Server SP1
- Microsoft Windows 2000 Datacenter Server SP1
- Microsoft Windows 2000 Professional SP2
- Microsoft Windows 2000 Professional SP2
- Microsoft Windows 2000 Professional SP1
- Microsoft Windows 2000 Professional SP1
+ Microsoft Windows 2000 Professional
+ Microsoft Windows 2000 Professional
- Microsoft Windows 2000 Server SP2
- Microsoft Windows 2000 Server SP2
- Microsoft Windows 2000 Server SP1
- Microsoft Windows 2000 Server SP1
+ Microsoft Windows 2000 Server
+ Microsoft Windows 2000 Server
Microsoft IIS 4.0
+ Cisco Building Broadband Service Manager (BBSM) 5.0
+ Cisco Building Broadband Service Manager (BBSM) 5.0
+ Cisco Call Manager 3.0
+ Cisco Call Manager 3.0
+ Cisco Call Manager 2.0
+ Cisco Call Manager 2.0
+ Cisco Call Manager 1.0
+ Cisco Call Manager 1.0
+ Cisco ICS 7750
+ Cisco ICS 7750
+ Cisco IP/VC 3540 Video Rate Matching Module
+ Cisco IP/VC 3540 Video Rate Matching Module
+ Cisco Unity Server 2.4
+ Cisco Unity Server 2.4
+ Cisco Unity Server 2.3
+ Cisco Unity Server 2.3
+ Cisco Unity Server 2.2
+ Cisco Unity Server 2.2
+ Cisco Unity Server 2.0
+ Cisco Unity Server 2.0
+ Cisco uOne 4.0
+ Cisco uOne 4.0
+ Cisco uOne 3.0
+ Cisco uOne 3.0
+ Cisco uOne 2.0
+ Cisco uOne 2.0
+ Cisco uOne 1.0
+ Cisco uOne 1.0
+ Hancom Hancom Office 2007 0
+ Hancom Hancom Office 2007 0
+ Microsoft BackOffice 4.5
+ Microsoft BackOffice 4.5
+ Microsoft Windows NT 4.0 Option Pack
+ Microsoft Windows NT 4.0 Option Pack
Cisco Unity Server 2.4
Cisco Unity Server 2.3
Cisco Unity Server 2.2
Cisco Unity Server 2.1
Cisco Unity Server 2.0
Cisco Call Manager 3.2
+ Cisco VoIP Phone 7902G 0
+ Cisco VoIP Phone 7905G 0
+ Cisco VoIP Phone 7912G 0
Cisco Call Manager 3.1
Cisco Call Manager 3.0
Cisco Building Broadband Service Manager (BBSM) 5.1
Cisco Building Broadband Service Manager (BBSM) 5.0
Cisco Building Broadband Service Manager (BBSM) 4.5
Cisco Building Broadband Service Manager (BBSM) 4.4
Cisco Building Broadband Service Manager (BBSM) 4.3
Cisco Building Broadband Service Manager (BBSM) 4.2
Cisco Building Broadband Service Manager (BBSM) 4.0.1

- 漏洞讨论

A vulnerability has been identified in the way Microsoft Internet Information Server's FTP service handles certain requests for transfer status.

The condition is present when a request is made for the FTP transfer status is made via the STAT command. A client issuing this command with a large number of file globbing characters as the argument may cause the service to crash.

On IIS 4.0 servers, the service must be manually restarted. On IIS 5.0 and 5.1 servers, the service will restart itself automatically.

A number of Cisco products are affected by this vulnerability, although this issue is not present in the Cisco products themselves.

- 漏洞利用

CORE has developed a working commercial exploit for their IMPACT product. This exploit is not otherwise publicly available or known to be circulating in the wild.

- 解决方案

Microsoft has released a cumulative patch to address this issue and others.

There are reports of problems with the fixes for users who are running
Microsoft IIS Site Server. A hotfix to address problems caused as a side
effect of installing the cumulative patch has apparently been released by
Microsoft. Any users who have experienced difficulties as a result of
installing the cumulative patch are advised to contact Microsoft support
and request hotfix Q317815.

Users of Cisco Unity products and Cisco Building Broadband Service Manager 4.x/5.x are advised to apply Microsoft's cumulative patch.


Microsoft IIS 4.0

Microsoft IIS 5.1

Microsoft IIS 5.0

Cisco Unity Server 2.0

Cisco Unity Server 2.1

Cisco Unity Server 2.2

Cisco Unity Server 2.3

Cisco Unity Server 2.4

Cisco Call Manager 3.0
  • Cisco win-OS-Upgrade.2000-1-3spA.exe


Cisco Call Manager 3.1
  • Cisco win-OS-Upgrade.2000-1-3spA.exe


Cisco Call Manager 3.2
  • Cisco win-OS-Upgrade.2000-1-3spA.exe


Cisco Building Broadband Service Manager (BBSM) 4.0.1

Cisco Building Broadband Service Manager (BBSM) 4.2

Cisco Building Broadband Service Manager (BBSM) 4.3

Cisco Building Broadband Service Manager (BBSM) 4.4

Cisco Building Broadband Service Manager (BBSM) 4.5

Cisco Building Broadband Service Manager (BBSM) 5.0

Cisco Building Broadband Service Manager (BBSM) 5.1

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站