CVE-2017-7269

Buffer overflow in the ScStoragePathFromUrl function in the WebDAV service in Internet Information Services (IIS) 6.0 in Microsoft Windows Server 2003 R2 allows remote attackers to execute arbitrary code via a long header beginning with "If: <http://" in a PROPFIND request, as exploited in the wild in July or August 2016.
References
Link Resource
http://www.securityfocus.com/bid/97127 Broken Link Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1038168 Broken Link Third Party Advisory VDB Entry
https://0patch.blogspot.com/2017/03/0patching-immortal-cve-2017-7269.html Exploit Third Party Advisory
https://github.com/danigargu/explodingcan Exploit
https://github.com/edwardz246003/IIS_exploit Broken Link Third Party Advisory
https://github.com/rapid7/metasploit-framework/pull/8162 Issue Tracking Patch
https://medium.com/%40iraklis/number-of-internet-facing-vulnerable-iis-6-0-to-cve-2017-7269-8bd153ef5812 Exploit
https://support.microsoft.com/en-us/help/3197835/description-of-the-security-update-for-windows-xp-and-windows-server Broken Link Patch Vendor Advisory
https://www.exploit-db.com/exploits/41738/ Exploit Third Party Advisory VDB Entry
https://www.exploit-db.com/exploits/41992/ Exploit Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/97127 Broken Link Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1038168 Broken Link Third Party Advisory VDB Entry
https://0patch.blogspot.com/2017/03/0patching-immortal-cve-2017-7269.html Exploit Third Party Advisory
https://github.com/danigargu/explodingcan Exploit
https://github.com/edwardz246003/IIS_exploit Broken Link Third Party Advisory
https://github.com/rapid7/metasploit-framework/pull/8162 Issue Tracking Patch
https://medium.com/%40iraklis/number-of-internet-facing-vulnerable-iis-6-0-to-cve-2017-7269-8bd153ef5812 Exploit
https://support.microsoft.com/en-us/help/3197835/description-of-the-security-update-for-windows-xp-and-windows-server Broken Link Patch Vendor Advisory
https://www.exploit-db.com/exploits/41738/ Exploit Third Party Advisory VDB Entry
https://www.exploit-db.com/exploits/41992/ Exploit Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:microsoft:internet_information_server:6.0:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2003:r2:*:*:*:*:*:*:*

History

21 Nov 2024, 03:31

Type Values Removed Values Added
References () http://www.securityfocus.com/bid/97127 - Broken Link, Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/97127 - Broken Link, Third Party Advisory, VDB Entry
References () http://www.securitytracker.com/id/1038168 - Broken Link, Third Party Advisory, VDB Entry () http://www.securitytracker.com/id/1038168 - Broken Link, Third Party Advisory, VDB Entry
References () https://0patch.blogspot.com/2017/03/0patching-immortal-cve-2017-7269.html - Exploit, Third Party Advisory () https://0patch.blogspot.com/2017/03/0patching-immortal-cve-2017-7269.html - Exploit, Third Party Advisory
References () https://github.com/danigargu/explodingcan - Exploit () https://github.com/danigargu/explodingcan - Exploit
References () https://github.com/edwardz246003/IIS_exploit - Broken Link, Third Party Advisory () https://github.com/edwardz246003/IIS_exploit - Broken Link, Third Party Advisory
References () https://github.com/rapid7/metasploit-framework/pull/8162 - Issue Tracking, Patch () https://github.com/rapid7/metasploit-framework/pull/8162 - Issue Tracking, Patch
References () https://medium.com/%40iraklis/number-of-internet-facing-vulnerable-iis-6-0-to-cve-2017-7269-8bd153ef5812 - Exploit () https://medium.com/%40iraklis/number-of-internet-facing-vulnerable-iis-6-0-to-cve-2017-7269-8bd153ef5812 - Exploit
References () https://support.microsoft.com/en-us/help/3197835/description-of-the-security-update-for-windows-xp-and-windows-server - Broken Link, Patch, Vendor Advisory () https://support.microsoft.com/en-us/help/3197835/description-of-the-security-update-for-windows-xp-and-windows-server - Broken Link, Patch, Vendor Advisory
References () https://www.exploit-db.com/exploits/41738/ - Exploit, Third Party Advisory, VDB Entry () https://www.exploit-db.com/exploits/41738/ - Exploit, Third Party Advisory, VDB Entry
References () https://www.exploit-db.com/exploits/41992/ - Exploit, Third Party Advisory, VDB Entry () https://www.exploit-db.com/exploits/41992/ - Exploit, Third Party Advisory, VDB Entry

25 Jul 2024, 14:01

Type Values Removed Values Added
CWE CWE-119 CWE-120
CPE cpe:2.3:o:microsoft:windows_server_2003:-:r2:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_server_2003:r2:*:*:*:*:*:*:*
References () http://www.securityfocus.com/bid/97127 - () http://www.securityfocus.com/bid/97127 - Broken Link, Third Party Advisory, VDB Entry
References () http://www.securitytracker.com/id/1038168 - () http://www.securitytracker.com/id/1038168 - Broken Link, Third Party Advisory, VDB Entry
References () https://0patch.blogspot.com/2017/03/0patching-immortal-cve-2017-7269.html - () https://0patch.blogspot.com/2017/03/0patching-immortal-cve-2017-7269.html - Exploit, Third Party Advisory
References () https://github.com/danigargu/explodingcan - () https://github.com/danigargu/explodingcan - Exploit
References () https://github.com/edwardz246003/IIS_exploit - Third Party Advisory () https://github.com/edwardz246003/IIS_exploit - Broken Link, Third Party Advisory
References () https://github.com/rapid7/metasploit-framework/pull/8162 - () https://github.com/rapid7/metasploit-framework/pull/8162 - Issue Tracking, Patch
References () https://medium.com/%40iraklis/number-of-internet-facing-vulnerable-iis-6-0-to-cve-2017-7269-8bd153ef5812 - () https://medium.com/%40iraklis/number-of-internet-facing-vulnerable-iis-6-0-to-cve-2017-7269-8bd153ef5812 - Exploit
References () https://support.microsoft.com/en-us/help/3197835/description-of-the-security-update-for-windows-xp-and-windows-server - () https://support.microsoft.com/en-us/help/3197835/description-of-the-security-update-for-windows-xp-and-windows-server - Broken Link, Patch, Vendor Advisory
References () https://www.exploit-db.com/exploits/41738/ - () https://www.exploit-db.com/exploits/41738/ - Exploit, Third Party Advisory, VDB Entry
References () https://www.exploit-db.com/exploits/41992/ - () https://www.exploit-db.com/exploits/41992/ - Exploit, Third Party Advisory, VDB Entry

07 Nov 2023, 02:50

Type Values Removed Values Added
References
  • {'url': 'https://medium.com/@iraklis/number-of-internet-facing-vulnerable-iis-6-0-to-cve-2017-7269-8bd153ef5812', 'name': 'https://medium.com/@iraklis/number-of-internet-facing-vulnerable-iis-6-0-to-cve-2017-7269-8bd153ef5812', 'tags': [], 'refsource': 'MISC'}
  • () https://medium.com/%40iraklis/number-of-internet-facing-vulnerable-iis-6-0-to-cve-2017-7269-8bd153ef5812 -

Information

Published : 2017-03-27 02:59

Updated : 2024-11-21 03:31


NVD link : CVE-2017-7269

Mitre link : CVE-2017-7269

CVE.ORG link : CVE-2017-7269


JSON object : View

Products Affected

microsoft

  • windows_server_2003
  • internet_information_server
CWE
CWE-120

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')