Executive Summary

Informations
Name CVE-2001-0500 First vendor Publication 2001-07-21
Vendor Cve Last vendor Modification 2018-10-12

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:C/I:C/A:C)
Cvss Base Score 10 Attack Range Network
Cvss Impact Score 10 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Buffer overflow in ISAPI extension (idq.dll) in Index Server 2.0 and Indexing Service 2000 in IIS 6.0 beta and earlier allows remote attackers to execute arbitrary commands via a long argument to Internet Data Administration (.ida) and Internet Data Query (.idq) files such as default.ida, as commonly exploited by Code Red.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0500

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:197
 
Oval ID: oval:org.mitre.oval:def:197
Title: IIS ISAPI Extension Indexing Service Buffer Overflow (Code Red)
Description: Buffer overflow in ISAPI extension (idq.dll) in Index Server 2.0 and Indexing Service 2000 in IIS 6.0 beta and earlier allows remote attackers to execute arbitrary commands via a long argument to Internet Data Administration (.ida) and Internet Data Query (.idq) files such as default.ida, as commonly exploited by Code Red.
Family: windows Class: vulnerability
Reference(s): CVE-2001-0500
Version: 7
Platform(s): Microsoft Windows 2000
Product(s): Microsoft Internet Information Server (IIS)
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 1
Application 1
Application 21
Application 8

ExploitDB Exploits

id Description
2010-06-15 Microsoft IIS 5.0 IDQ Path Overflow

OpenVAS Exploits

Date Description
2005-11-03 Name : CodeRed version X detection
File : nvt/codered_x.nasl
2005-11-03 Name : IIS .IDA ISAPI filter applied
File : nvt/iis_ida_isapi.nasl

Open Source Vulnerability Database (OSVDB)

Id Description
568 Microsoft IIS idq.dll IDA/IDQ ISAPI Remote Overflow

A remote overflow exists in Microsoft IIS. The 'idq.dll' library fails to perform proper bounds checking resulting in a buffer overflow. With a specially crafted request containing an overly long argument to Internet Data Administration (.ida) and Internet Data Query (.idq) files, a remote attacker can cause arbitrary code execution resulting in a loss of integrity.

Snort® IPS/IDS

Date Description
2014-01-10 ISAPI .idq attempt
RuleID : 1244-community - Revision : 29 - Type : SERVER-IIS
2014-01-10 ISAPI .idq attempt
RuleID : 1244 - Revision : 29 - Type : SERVER-IIS
2014-01-10 ISAPI .ida attempt
RuleID : 1243-community - Revision : 26 - Type : SERVER-IIS
2014-01-10 ISAPI .ida attempt
RuleID : 1243 - Revision : 26 - Type : SERVER-IIS

Nessus® Vulnerability Scanner

Date Description
2003-03-12 Name : The remote host is vulnerable to privilege escalation.
File : smb_nt_ms02-001.nasl - Type : ACT_GATHER_INFO
2001-06-19 Name : Indexing Service filter is enabled on the remote Web server.
File : iis_ida_isapi.nasl - Type : ACT_GATHER_INFO
2001-06-19 Name : The remote web server is affected by multiple vulnerabilities.
File : iis_isapi_overflow.nasl - Type : ACT_ATTACK

Sources (Detail)

Source Url
BID http://www.securityfocus.com/bid/2880
BUGTRAQ http://www.securityfocus.com/archive/1/191873
CERT http://www.cert.org/advisories/CA-2001-13.html
CIAC http://www.ciac.org/ciac/bulletins/l-098.shtml
MS https://docs.microsoft.com/en-us/security-updates/securitybulletins/2001/ms01...
OVAL https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.ova...
XF http://www.iss.net/security_center/static/6705.php

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
Date Informations
2024-02-02 01:01:38
  • Multiple Updates
2024-02-01 12:01:16
  • Multiple Updates
2023-09-05 12:01:34
  • Multiple Updates
2023-09-05 01:01:07
  • Multiple Updates
2023-09-02 12:01:35
  • Multiple Updates
2023-09-02 01:01:07
  • Multiple Updates
2023-08-12 12:01:56
  • Multiple Updates
2023-08-12 01:01:08
  • Multiple Updates
2023-08-11 12:01:39
  • Multiple Updates
2023-08-11 01:01:08
  • Multiple Updates
2023-08-06 12:01:31
  • Multiple Updates
2023-08-06 01:01:08
  • Multiple Updates
2023-08-04 12:01:35
  • Multiple Updates
2023-08-04 01:01:08
  • Multiple Updates
2023-07-14 12:01:33
  • Multiple Updates
2023-07-14 01:01:09
  • Multiple Updates
2023-03-29 01:01:31
  • Multiple Updates
2023-03-28 12:01:13
  • Multiple Updates
2022-10-11 12:01:23
  • Multiple Updates
2022-10-11 01:01:01
  • Multiple Updates
2021-05-04 12:01:22
  • Multiple Updates
2021-04-22 01:01:33
  • Multiple Updates
2021-02-06 12:01:03
  • Multiple Updates
2020-11-25 01:01:01
  • Multiple Updates
2020-11-24 12:01:12
  • Multiple Updates
2020-05-23 13:16:43
  • Multiple Updates
2020-05-23 01:35:32
  • Multiple Updates
2020-05-23 00:14:38
  • Multiple Updates
2018-10-13 00:22:24
  • Multiple Updates
2017-11-22 12:01:30
  • Multiple Updates
2017-10-10 09:23:20
  • Multiple Updates
2016-06-28 23:45:25
  • Multiple Updates
2016-06-28 14:55:55
  • Multiple Updates
2016-04-26 11:53:20
  • Multiple Updates
2016-03-11 05:23:40
  • Multiple Updates
2016-03-11 00:24:31
  • Multiple Updates
2014-02-17 10:23:49
  • Multiple Updates
2014-01-19 21:21:26
  • Multiple Updates
2013-05-11 12:04:15
  • Multiple Updates