Executive Summary

Informations
Name MS00-006 First vendor Publication N/A
Vendor Microsoft Last vendor Modification N/A
Severity (Vendor) N/A Revision N/A

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:P/I:N/A:N)
Cvss Base Score 5 Attack Range Network
Cvss Impact Score 2.9 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Malformed Hit-Highlighting Argument Vulnerability

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 1

ExploitDB Exploits

id Description
2000-02-02 Microsoft IIS 3.0/4.0,Microsoft Index Server 2.0 Directory Traversal

OpenVAS Exploits

Date Description
2008-09-09 Name : Microsoft MS00-06 security check
File : nvt/remote-MS00-006.nasl

Open Source Vulnerability Database (OSVDB)

Id Description
7608 Microsoft Index Server Internet Data Query Path Disclosure

Microsoft Index Server in Microsoft Windows contains a flaw that may lead to an unauthorized information disclosure. By providing a request to a non-existent Internet Data Query file, a remote attacker could reveal the physical path to the web directory that was contained in the request resulting in a loss of confidentiality.
1210 Microsoft IIS WebHits.dll ISAPI Filter Traversal Arbitrary File Access

Microsoft IIS contains a flaw that allows a remote attacker to access arbitrary files outside of the web path. The issue is due to the webhits.dll library not properly sanitizing user input, specifically traversal style attacks (../../) supplied via the "CiWebHitsFile" variable. By supplying a crafted request to an htw script, it is possible to read arbitrary files on the system.
271 Microsoft IIS WebHits null.htw .asp Source Disclosure

Microsoft IIS contains a flaw that allows a remote attacker to view the source of .asp files. The issue is due to IIS mapping all .htw files to be handled by Webhits.dll. By appending a space (%20) to the end of a filename or calling CiWebHitsFile as a variable, setting the "CiHiliteType" variable to "Full", and setting the "CiRestriction" variable to "None", the server will return the source of an .asp file.

Snort® IPS/IDS

Date Description
2014-01-10 ASP contents view
RuleID : 979-community - Revision : 22 - Type : SERVER-IIS
2014-01-10 ASP contents view
RuleID : 979 - Revision : 22 - Type : SERVER-IIS
2014-01-10 ASP contents view
RuleID : 978-community - Revision : 21 - Type : SERVER-IIS
2014-01-10 ASP contents view
RuleID : 978 - Revision : 21 - Type : SERVER-IIS
2014-01-10 webhits.exe access
RuleID : 1073-community - Revision : 15 - Type : SERVER-WEBAPP
2014-01-10 webhits.exe access
RuleID : 1073 - Revision : 15 - Type : SERVER-WEBAPP
2014-01-10 webhits access
RuleID : 1044-community - Revision : 17 - Type : SERVER-IIS
2014-01-10 webhits access
RuleID : 1044 - Revision : 17 - Type : SERVER-IIS
2014-01-10 Internet Data Query prxdocs prxrch.idq directory traversal attempt
RuleID : 10401 - Revision : 4 - Type : WEB-IIS
2014-01-10 Internet Data Query iissamples query.idq directory traversal attempt
RuleID : 10400 - Revision : 4 - Type : WEB-IIS
2014-01-10 Internet Data Query iissamples fastq.idq directory traversal attempt
RuleID : 10399 - Revision : 4 - Type : WEB-IIS
2014-01-10 Internet Data Query exair search.idq directory traversal attempt
RuleID : 10398 - Revision : 4 - Type : WEB-IIS
2014-01-10 Internet Data Query exair query.idq directory traversal attempt
RuleID : 10397 - Revision : 4 - Type : WEB-IIS
2014-01-10 Internet Data Query query.idq directory traversal attempt
RuleID : 10396 - Revision : 4 - Type : WEB-IIS
2014-01-10 Malformed Hit-Highlighting Argument File Access Attempt
RuleID : 1019-community - Revision : 30 - Type : SERVER-IIS
2014-01-10 Malformed Hit-Highlighting Argument File Access Attempt
RuleID : 1019 - Revision : 30 - Type : SERVER-IIS

Nessus® Vulnerability Scanner

Date Description
2003-03-12 Name : The remote host is vulnerable to privilege escalation.
File : smb_nt_ms02-001.nasl - Type : ACT_GATHER_INFO
2002-04-11 Name : The remote web server is affected by a denial of service vulnerability.
File : iis_frontpage_dos.nasl - Type : ACT_DENIAL
2000-08-24 Name : The remote IIS web server is missing a security patch.
File : iis_anything_idq.nasl - Type : ACT_GATHER_INFO
2000-04-01 Name : The remote web server is affected by an information disclosure vulnerability.
File : ms_index_server.nasl - Type : ACT_GATHER_INFO
2000-02-08 Name : The remote Windows host is affected by an information disclosure vulnerability.
File : idq_dll.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
1
Date Informations
2014-02-17 11:44:20
  • Multiple Updates
2014-01-19 21:29:42
  • Multiple Updates