SonicWALL Comprehensive Internet Security
Home
SonicALERT
Search
Search TipsSitemap

Support

 

WEB-IIS  All Categories


  Denial of service in Windows NT IIS server using ..\..
  Microsoft IIS 4.0 and 5.0 with the IISADMPWD virtual directory installed allows a remote attacker to cause a denial of service via a malformed request to the inetinfo.exe program, aka the "Undelimited .HTR Request" vulnerability.
  Heap-based buffer overflow in the Remote Data Services (RDS) component of Microsoft Data Access Components (MDAC) 2.1 through 2.6, and Internet Explorer 5.01 through 6.0, allows remote attackers to execute code via a malformed HTTP request to the Data Stub.
  IIS 4.0 allows a remote attacker to obtain the real pathname of the document root by requesting non-existent files with .ida or .idq extensions.
  In IIS, remote attackers can obtain source code for ASP files by appending "::$DATA" to the URL.
  Buffer overflow in IIS 4.0 allows remote attackers to cause a denial of service via a malformed request for files with .HTR, .IDC, or .STM extensions.
  .htr Transfer-Encoding\: chunked
  .asp Transfer-Encoding\: chunked
  IIS 4.0 and 5.0 allows remote attackers to obtain fragments of source code by appending a +.htr to the URL, a variant of the "File Fragment Reading via .HTR" vulnerability.
  IIS 4.0 and 5.0 allows remote attackers to read documents outside of the web root, and possibly execute arbitrary commands, via malformed URLs that contain UNICODE encoded characters, aka the "Web Server Folder Traversal" vulnerability.
  The CiWebHitsFile component in Microsoft Indexing Services for Windows 2000 allows remote attackers to conduct a cross site scripting (CSS) attack via a CiRestriction parameter in a .htw request, aka the "Indexing Services Cross Site Scripting" vulnerability.
  ASP contents view
  SAM Attempt
  cmd32.exe access
  cmd.exe access
  cmd? access
  cross-site scripting attempt
  cross-site scripting attempt
  del attempt
  directory listing
  /scripts/iisadmin/default.htm access
  asp-dot attempt
  asp-srch attempt
  fpcount attempt
  index server file source code attempt
  ism.dll attempt
  perl-browse0a attempt
  perl-browse20 attempt
  scripts-browse access
  CodeRed v2 root.exe access
  outlook web dos
  /scripts/samples/ access
  /msadc/samples/ access
  iissamples access
  multiple decode attempt
  iisadmin access
  /exchange/root.asp attempt
  WebDav ntdll.dll (rs_iis)
  WebDav ntdll.dll (kralor probe)
  WebDav ntdll.dll (kralor shellcode)
  WebDav ntdll.dll (webdavx.pl)
  WebDav ntdll.dll (wd.pl)
  WebDav ntdll.dll (KaHT probe)
  MS Site Server default login attempt
  MS Site Server admin attempt
  Buffer overflow in ntdll.dll on Microsoft Windows NT 4.0, Windows NT 4.0 Terminal Server Edition, Windows 2000, and Windows XP allows remote attackers to execute arbitrary code, as demonstrated via a WebDAV request to IIS 5.0.
  Buffer overflow in the HTTP receiver function (BizTalkHTTPReceive.dll ISAPI) of Microsoft BizTalk Server 2002 allows attackers to execute arbitrary code via a certain request to the HTTP receiver.
  SQL injection vulnerability in the Document Tracking and Administration (DTA) website of Microsoft BizTalk Server 2000 and 2002 allows remote attackers to execute operating system commands via a request to (1) rawdocdata.asp or (2) RawCustomSearchField.asp containing an embedded SQL statement.
  SQL injection vulnerability in bttlxeForum 2.0 beta 3 and earlier allows remote attackers to bypass authentication via the (1) username and (2) password fields, and possibly other fields.
  IIS allows users to execute arbitrary commands using .bat or .cmd files.
  IIS 3.0 with the iis-fix hotfix installed allows remote intruders to read source code for ASP programs by using a %2e instead of a . (dot) in the URL.
  The showcode.asp sample file in IIS and Site Server allows remote attackers to read arbitrary files.
  In Microsoft Site Server 3.0 a configuration problem exists in the Ad Server Sample directory (AdSamples) allowing an attacker to retrieve SITE.CSC, exposing sensitive SQL database information.
  The Remote Data Service (RDS) DataFactory component of Microsoft Data Access Components (MDAC) in IIS 3.x and 4.x exposes unsafe methods, which allows remote attackers to execute arbitrary commands.
  IIS does not properly canonicalize URLs, potentially allowing remote attackers to bypass access restrictions in third-party software via escape characters, aka the "Escape Character Parsing" vulnerability.
  The WebHits ISAPI filter in Microsoft Index Server allows remote attackers to read arbitrary files, aka the "Malformed Hit-Highlighting Argument" vulnerability.
  IIS newdsn.exe CGI script allows remote users to overwrite files.
  By default, IIS 4.0 has a virtual directory /IISADMPWD which contains files that can be used as proxies for brute force password attacks, or to identify valid users on the system.
  Frontpage Server Extensions allows remote attackers to determine the physical path of a virtual directory via a GET request to the htimage.exe CGI program.
  Buffer overflows in htimage.exe and Imagemap.exe in FrontPage 97 and 98 Server Extensions allow a user to conduct activities that are not otherwise available through the web site, aka the "Server-Side Image Map Components" vulnerability.
  Unicode2.pl script (File permission canonicalization)
  _vti_inf access
  CGImail.exe access
  MSProxy access
  repost.asp access
  IIS 5.0 allows remote attackers to obtain source code for .ASP files and other scripts via an HTTP GET request with a "Translate: f" header, aka the "Specialized Header" vulnerability.
  /StoreCSVS/InstantOrder.asmx request
  users.xml access
  as_web.exe access
  as_web4.exe access
  NewsPro administration authentication attempt
  pbserver access
  trace.axd access
  mkilog.exe access
  ctss.idc access
  /iisadmpwd/aexp2.htr access
  WebDAV file lock attempt
  ISAPI .printer access
  .cnf access
  msdac access
  _mem_bin access
  search97.vts access
  srch.htm access
  srchadm access
  uploadn.asp access
  viewcode.asp access
  doctodep.btr access
  site/iisamples access
  perl access
  fpcount access
  getdrvs.exe access
  bdir.htr access
  exec-src access
  postinfo.asp access
  /exchange/root.asp access
  nsiislog.dll access
  IISProtect siteadmin.asp access
  IISProtect globaladmin.asp access
  IISProtect access
  Synchrologic Email Accelerator userid list access attempt
  register.asp access


Relevant Information
IPS Alert Level
Low
Medium
High


Home | Products | Applications | Markets | Support | How to Buy | Channel Partners | Company

Comprehensive Internet Security ® 2003 SonicWALL, Inc. | Privacy Statement