Buffer overflow in the ScStoragePathFromUrl function in the WebDAV service in Internet Information Services (IIS) 6.0 in Microsoft Windows Server 2003 R2 allows remote attackers to execute arbitrary code via a long header beginning with "If: <http://" in a PROPFIND request, as exploited in the wild in July or August 2016.
References
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 03:31
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.securityfocus.com/bid/97127 - Broken Link, Third Party Advisory, VDB Entry | |
References | () http://www.securitytracker.com/id/1038168 - Broken Link, Third Party Advisory, VDB Entry | |
References | () https://0patch.blogspot.com/2017/03/0patching-immortal-cve-2017-7269.html - Exploit, Third Party Advisory | |
References | () https://github.com/danigargu/explodingcan - Exploit | |
References | () https://github.com/edwardz246003/IIS_exploit - Broken Link, Third Party Advisory | |
References | () https://github.com/rapid7/metasploit-framework/pull/8162 - Issue Tracking, Patch | |
References | () https://medium.com/%40iraklis/number-of-internet-facing-vulnerable-iis-6-0-to-cve-2017-7269-8bd153ef5812 - Exploit | |
References | () https://support.microsoft.com/en-us/help/3197835/description-of-the-security-update-for-windows-xp-and-windows-server - Broken Link, Patch, Vendor Advisory | |
References | () https://www.exploit-db.com/exploits/41738/ - Exploit, Third Party Advisory, VDB Entry | |
References | () https://www.exploit-db.com/exploits/41992/ - Exploit, Third Party Advisory, VDB Entry |
25 Jul 2024, 14:01
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-120 | |
CPE | cpe:2.3:o:microsoft:windows_server_2003:r2:*:*:*:*:*:*:* | |
References | () http://www.securityfocus.com/bid/97127 - Broken Link, Third Party Advisory, VDB Entry | |
References | () http://www.securitytracker.com/id/1038168 - Broken Link, Third Party Advisory, VDB Entry | |
References | () https://0patch.blogspot.com/2017/03/0patching-immortal-cve-2017-7269.html - Exploit, Third Party Advisory | |
References | () https://github.com/danigargu/explodingcan - Exploit | |
References | () https://github.com/edwardz246003/IIS_exploit - Broken Link, Third Party Advisory | |
References | () https://github.com/rapid7/metasploit-framework/pull/8162 - Issue Tracking, Patch | |
References | () https://medium.com/%40iraklis/number-of-internet-facing-vulnerable-iis-6-0-to-cve-2017-7269-8bd153ef5812 - Exploit | |
References | () https://support.microsoft.com/en-us/help/3197835/description-of-the-security-update-for-windows-xp-and-windows-server - Broken Link, Patch, Vendor Advisory | |
References | () https://www.exploit-db.com/exploits/41738/ - Exploit, Third Party Advisory, VDB Entry | |
References | () https://www.exploit-db.com/exploits/41992/ - Exploit, Third Party Advisory, VDB Entry |
07 Nov 2023, 02:50
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2017-03-27 02:59
Updated : 2024-11-21 03:31
NVD link : CVE-2017-7269
Mitre link : CVE-2017-7269
CVE.ORG link : CVE-2017-7269
JSON object : View
Products Affected
microsoft
- windows_server_2003
- internet_information_server
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')