Executive Summary

Informations
Name MS03-007 First vendor Publication N/A
Vendor Microsoft Last vendor Modification N/A
Severity (Vendor) N/A Revision N/A

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:P)
Cvss Base Score 7.5 Attack Range Network
Cvss Impact Score 6.4 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Unchecked Buffer in Windows Component Could Cause Web Server Compromise (815021)

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:109
 
Oval ID: oval:org.mitre.oval:def:109
Title: Windows ntdll.dll Buffer Overflow
Description: Buffer overflow in ntdll.dll on Microsoft Windows NT 4.0, Windows NT 4.0 Terminal Server Edition, Windows 2000, and Windows XP allows remote attackers to execute arbitrary code, as demonstrated via a WebDAV request to IIS 5.0.
Family: windows Class: vulnerability
Reference(s): CVE-2003-0109
Version: 4
Platform(s): Microsoft Windows 2000
Product(s):
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Os 4
Os 4

SAINT Exploits

Description Link
ntdll.dll buffer overflow via IIS 5.0 WebDAV More info here

ExploitDB Exploits

id Description
2010-07-25 Microsoft IIS 5.0 WebDAV ntdll.dll Path Overflow
2003-03-24 MS Windows WebDAV Remote PoC Exploit

OpenVAS Exploits

Date Description
2009-03-15 Name : MS04-011 security check
File : nvt/remote-MS04-011.nasl
2005-11-03 Name : Unchecked Buffer in ntdll.dll (Q815021)
File : nvt/smb_nt_ms03-007.nasl

Open Source Vulnerability Database (OSVDB)

Id Description
4467 Microsoft Windows WebDav ntdll.dll Remote Overflow

Windows servers with WebDAV enabled contain a flaw that may allow a remote attacker to execute arbitrary code. The issue is due to the ntdll.dll component of the WebDAV not properly sanitizing input to a path conversion function. If an attacker sends a specially crafted request to this function, they may be able to execute arbitrary code with SYSTEM privileges.

Snort® IPS/IDS

Date Description
2014-01-10 LOCK WebDAV Stack Buffer Overflow attempt
RuleID : 21235 - Revision : 7 - Type : SERVER-WEBAPP
2014-01-10 WEBDAV nessus safe scan attempt
RuleID : 2091-community - Revision : 16 - Type : SERVER-IIS
2014-01-10 WEBDAV nessus safe scan attempt
RuleID : 2091 - Revision : 16 - Type : SERVER-IIS
2014-01-10 WEBDAV exploit attempt
RuleID : 2090-community - Revision : 22 - Type : SERVER-IIS
2014-01-10 WEBDAV exploit attempt
RuleID : 2090 - Revision : 22 - Type : SERVER-IIS
2014-01-10 Oracle Java Web Server WebDAV Stack Buffer Overflow attempt
RuleID : 18613 - Revision : 11 - Type : SERVER-WEBAPP
2014-01-10 Oracle Java Web Server WebDAV Stack Buffer Overflow attempt
RuleID : 18612 - Revision : 14 - Type : SERVER-WEBAPP
2014-01-10 Microsoft Windows WebDAV search overflow attempt
RuleID : 11686 - Revision : 15 - Type : OS-WINDOWS

Metasploit Database

id Description
2003-05-30 MS03-007 Microsoft IIS 5.0 WebDAV ntdll.dll Path Overflow

Nessus® Vulnerability Scanner

Date Description
2003-03-18 Name : The remote web server is affected by a buffer overflow vulnerability.
File : iis_webdav_overflow.nasl - Type : ACT_DESTRUCTIVE_ATTACK
2003-03-18 Name : Arbitrary code can be executed on the remote host.
File : smb_nt_ms03-007.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
Date Informations
2020-05-23 13:17:12
  • Multiple Updates
2016-03-10 17:23:53
  • Multiple Updates
2016-03-10 13:23:12
  • Multiple Updates
2014-02-17 11:44:49
  • Multiple Updates
2014-01-19 21:29:48
  • Multiple Updates