The w3svc.dll ISAPI filter in Front Page Server Extensions and ASP.NET for Internet Information Server (IIS) 4.0, 5.0, and 5.1 does not properly handle the error condition when a long URL is provided, which allows remote attackers to cause a denial of service (crash) when the URL parser accesses a null pointer.
References
Configurations
Configuration 1 (hide)
|
History
20 Nov 2024, 23:38
Type | Values Removed | Values Added |
---|---|---|
References | () http://marc.info/?l=bugtraq&m=101853851025208&w=2 - | |
References | () http://www.cert.org/advisories/CA-2002-09.html - US Government Resource | |
References | () http://www.cisco.com/warp/public/707/Microsoft-IIS-vulnerabilities-MS02-018.shtml - | |
References | () http://www.iss.net/security_center/static/8800.php - | |
References | () http://www.kb.cert.org/vuls/id/521059 - US Government Resource | |
References | () http://www.osvdb.org/3326 - | |
References | () http://www.securityfocus.com/bid/4479 - | |
References | () https://docs.microsoft.com/en-us/security-updates/securitybulletins/2002/ms02-018 - |
Information
Published : 2002-04-22 04:00
Updated : 2024-11-20 23:38
NVD link : CVE-2002-0072
Mitre link : CVE-2002-0072
CVE.ORG link : CVE-2002-0072
JSON object : View
Products Affected
microsoft
- internet_information_services
- internet_information_server
CWE