VAR-200107-0142

Vulnerability from variot - Updated: 2025-04-03 22:16

Buffer overflow in ISAPI extension (idq.dll) in Index Server 2.0 and Indexing Service 2000 in IIS 6.0 beta and earlier allows remote attackers to execute arbitrary commands via a long argument to Internet Data Administration (.ida) and Internet Data Query (.idq) files such as default.ida, as commonly exploited by Code Red. A vulnerability in IIS 4.0 may permit intruders to crash vulnerable IIS servers with URL redirection enabled. A vulnerability exists in the Indexing services used by Microsoft IIS 4.0 and IIS 5.0 running on Windows NT, Windows 2000, and beta versions of Windows XP. Exploitations of this vulnerability allows a remote intruder to run arbitrary code on the victim machine. An unchecked buffer resides in the 'idq.dll' ISAPI extension associated with each service. Note that Index Server and Indexing Service do not need to be running for an attacker to exploit this issue. Since 'idq.dll' is installed by default when IIS is installed, IIS would need to be the only service running. Note also that this vulnerability is currently being exploited by the 'Code Red' worm. In addition, all products that run affected versions of IIS are also vulnerable. UPDATE: An aggressive worm that actively exploits this vulnerability is believed to be in the wild

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-200107-0142",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "index server",
        "scope": "eq",
        "trust": 1.9,
        "vendor": "microsoft",
        "version": "2.0"
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "microsoft",
        "version": null
      },
      {
        "model": "indexing service",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "microsoft",
        "version": "*"
      },
      {
        "model": "internet information server",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "microsoft",
        "version": "6.0"
      },
      {
        "model": "iis",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "microsoft",
        "version": "4.0"
      },
      {
        "model": "iis",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "microsoft",
        "version": "5.0"
      },
      {
        "model": "call manager",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "cisco",
        "version": "3.1"
      },
      {
        "model": "indexing service",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "microsoft",
        "version": "windows_2000"
      },
      {
        "model": "internet information server",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "microsoft",
        "version": "6.0"
      },
      {
        "model": "indexing services for windows",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "2000"
      },
      {
        "model": "uone enterprise edition",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "uone",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "4.0"
      },
      {
        "model": "uone",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "3.0"
      },
      {
        "model": "uone",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "2.0"
      },
      {
        "model": "uone",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "1.0"
      },
      {
        "model": "unity server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "4.0"
      },
      {
        "model": "unity server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "3.3"
      },
      {
        "model": "unity server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "3.2"
      },
      {
        "model": "unity server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "3.1"
      },
      {
        "model": "unity server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "3.0"
      },
      {
        "model": "unity server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "2.46"
      },
      {
        "model": "unity server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "2.4"
      },
      {
        "model": "unity server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "2.3"
      },
      {
        "model": "unity server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "2.2"
      },
      {
        "model": "unity server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "2.1"
      },
      {
        "model": "unity server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "2.0"
      },
      {
        "model": "unity server",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "trailhead",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "media blender",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ip/vc application server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "3540"
      },
      {
        "model": "ics",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "2.0"
      },
      {
        "model": "ics",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "1.0"
      },
      {
        "model": "ics",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "7750"
      },
      {
        "model": "dynamic content adapter",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "collaboration server",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "call manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "4.0"
      },
      {
        "model": "call manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "3.3(3)"
      },
      {
        "model": "call manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "3.3"
      },
      {
        "model": "call manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "3.2"
      },
      {
        "model": "call manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "3.1(2)"
      },
      {
        "model": "call manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "3.0"
      },
      {
        "model": "call manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "2.0"
      },
      {
        "model": "call manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "1.0"
      },
      {
        "model": "call manager",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "building broadband service manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "5.2"
      },
      {
        "model": "building broadband service manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "5.1"
      },
      {
        "model": "building broadband service manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "5.0"
      },
      {
        "model": "building broadband service manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "4.5"
      },
      {
        "model": "building broadband service manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "4.4"
      },
      {
        "model": "building broadband service manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "4.3"
      },
      {
        "model": "building broadband service manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "4.2"
      },
      {
        "model": "building broadband service manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "4.0.1"
      },
      {
        "model": "building broadband service manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "3.0"
      },
      {
        "model": "building broadband service manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "2.5.1"
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#544555"
      },
      {
        "db": "CERT/CC",
        "id": "VU#952336"
      },
      {
        "db": "BID",
        "id": "2880"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2001-000097"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200107-163"
      },
      {
        "db": "NVD",
        "id": "CVE-2001-0500"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/a:microsoft:iis",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2001-000097"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Eeye Digital Security",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200107-163"
      }
    ],
    "trust": 0.6
  },
  "cve": "CVE-2001-0500",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "COMPLETE",
            "baseScore": 10.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 10.0,
            "id": "CVE-2001-0500",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 1.8,
            "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2001-0500",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "CARNEGIE MELLON",
            "id": "VU#544555",
            "trust": 0.8,
            "value": "22.50"
          },
          {
            "author": "CARNEGIE MELLON",
            "id": "VU#952336",
            "trust": 0.8,
            "value": "69.30"
          },
          {
            "author": "NVD",
            "id": "CVE-2001-0500",
            "trust": 0.8,
            "value": "High"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-200107-163",
            "trust": 0.6,
            "value": "CRITICAL"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#544555"
      },
      {
        "db": "CERT/CC",
        "id": "VU#952336"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2001-000097"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200107-163"
      },
      {
        "db": "NVD",
        "id": "CVE-2001-0500"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Buffer overflow in ISAPI extension (idq.dll) in Index Server 2.0 and Indexing Service 2000 in IIS 6.0 beta and earlier allows remote attackers to execute arbitrary commands via a long argument to Internet Data Administration (.ida) and Internet Data Query (.idq) files such as default.ida, as commonly exploited by Code Red. A vulnerability in IIS 4.0 may permit intruders to crash vulnerable IIS servers with URL redirection enabled. A vulnerability exists in the Indexing services used by Microsoft IIS 4.0 and IIS 5.0 running on Windows NT, Windows 2000, and beta versions of Windows XP. Exploitations of this vulnerability allows a remote intruder to run arbitrary code on the victim machine. An unchecked buffer resides in the \u0027idq.dll\u0027 ISAPI extension associated with each service. \nNote that Index Server and Indexing Service do not need to be running for an attacker to exploit this issue. Since \u0027idq.dll\u0027 is installed by default when IIS is installed, IIS would need to be the only service running. \nNote also that this vulnerability is currently being exploited by the \u0027Code Red\u0027 worm. In addition, all products that run affected versions of IIS are also vulnerable. \n**UPDATE**: An aggressive worm that actively exploits this vulnerability is believed to be in the wild",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2001-0500"
      },
      {
        "db": "CERT/CC",
        "id": "VU#544555"
      },
      {
        "db": "CERT/CC",
        "id": "VU#952336"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2001-000097"
      },
      {
        "db": "BID",
        "id": "2880"
      }
    ],
    "trust": 3.33
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "BID",
        "id": "2880",
        "trust": 3.5
      },
      {
        "db": "NVD",
        "id": "CVE-2001-0500",
        "trust": 2.7
      },
      {
        "db": "CERT/CC",
        "id": "VU#952336",
        "trust": 1.6
      },
      {
        "db": "CERT/CC",
        "id": "VU#544555",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2001-000097",
        "trust": 0.8
      },
      {
        "db": "CERT/CC",
        "id": "CA-2001-13",
        "trust": 0.6
      },
      {
        "db": "OVAL",
        "id": "OVAL:ORG.MITRE.OVAL:DEF:197",
        "trust": 0.6
      },
      {
        "db": "CIAC",
        "id": "L-098",
        "trust": 0.6
      },
      {
        "db": "MS",
        "id": "MS01-033",
        "trust": 0.6
      },
      {
        "db": "XF",
        "id": "6705",
        "trust": 0.6
      },
      {
        "db": "BUGTRAQ",
        "id": "20010618 ALL VERSIONS OF MICROSOFT INTERNET INFORMATION SERVICES, REMOTE BUFFER OVERFLOW (SYSTEM LEVEL ACCESS)",
        "trust": 0.6
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200107-163",
        "trust": 0.6
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#544555"
      },
      {
        "db": "CERT/CC",
        "id": "VU#952336"
      },
      {
        "db": "BID",
        "id": "2880"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2001-000097"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200107-163"
      },
      {
        "db": "NVD",
        "id": "CVE-2001-0500"
      }
    ]
  },
  "id": "VAR-200107-0142",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VARIoT devices database",
        "id": null
      }
    ],
    "trust": 1.0
  },
  "last_update_date": "2025-04-03T22:16:58.958000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "MS01-033",
        "trust": 0.8,
        "url": "http://www.microsoft.com/technet/security/bulletin/MS01-033.mspx"
      },
      {
        "title": "MS01-033",
        "trust": 0.8,
        "url": "http://www.microsoft.com/japan/technet/security/bulletin/MS01-033.mspx"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2001-000097"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "NVD-CWE-Other",
        "trust": 1.0
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2001-0500"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 3.2,
        "url": "http://www.securityfocus.com/bid/2880"
      },
      {
        "trust": 2.7,
        "url": "http://www.cert.org/advisories/ca-2001-13.html"
      },
      {
        "trust": 1.7,
        "url": "http://www.microsoft.com/technet/security/bulletin/ms01-033.asp"
      },
      {
        "trust": 1.6,
        "url": "http://www.securityfocus.com/archive/1/191873"
      },
      {
        "trust": 1.6,
        "url": "http://www.iss.net/security_center/static/6705.php"
      },
      {
        "trust": 1.6,
        "url": "http://www.ciac.org/ciac/bulletins/l-098.shtml"
      },
      {
        "trust": 1.1,
        "url": "http://www.eeye.com/html/research/advisories/ad20010618.html"
      },
      {
        "trust": 1.1,
        "url": "http://www.cert.org/advisories/ca-2001-23.html"
      },
      {
        "trust": 1.1,
        "url": "http://www.cert.org/advisories/ca-2001-19.html"
      },
      {
        "trust": 1.0,
        "url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a197"
      },
      {
        "trust": 1.0,
        "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2001/ms01-033"
      },
      {
        "trust": 0.8,
        "url": "http://www.microsoft.com/technet/itsolutions/security/tools/redthree.asp?frame=true"
      },
      {
        "trust": 0.8,
        "url": "http://www.kb.cert.org/vuls/id/952336"
      },
      {
        "trust": 0.8,
        "url": "http://www.microsoft.com/technet/security/bulletin/ms01-044.asp"
      },
      {
        "trust": 0.8,
        "url": "http://support.microsoft.com/support/kb/articles/q300/9/72.asp"
      },
      {
        "trust": 0.8,
        "url": "http://www.microsoft.com/technet/security/iis5chk.asp"
      },
      {
        "trust": 0.8,
        "url": "http://www.microsoft.com/technet/security/tools.asp"
      },
      {
        "trust": 0.8,
        "url": "http://www.cert.org/advisories/ca-2001-20.html"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2001-0500"
      },
      {
        "trust": 0.8,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2001-0500"
      },
      {
        "trust": 0.6,
        "url": "http://oval.mitre.org/repository/data/getdef?id=oval:org.mitre.oval:def:197"
      },
      {
        "trust": 0.3,
        "url": "http://www.microsoft.com/technet/treeview/default.asp?url=/technet/itsolutions/security/topics/codealrt.asp"
      },
      {
        "trust": 0.3,
        "url": "http://www.cert.org/incident_notes/in-2001-08.html"
      },
      {
        "trust": 0.3,
        "url": "http://www.cert.org/incident_notes/in-2001-09.html"
      },
      {
        "trust": 0.3,
        "url": "http://www.cert.org/incident_notes/in-2001-10.html"
      },
      {
        "trust": 0.3,
        "url": "http://www.cisco.com/warp/public/707/cisco-code-red-worm-pub.shtml"
      },
      {
        "trust": 0.3,
        "url": "http://support.coresecurity.com/impact/exploits/f1808bf3760bbf79f661eed53e93ca64.html"
      },
      {
        "trust": 0.3,
        "url": "http://www.microsoft.com/technet/treeview/default.asp?url=/technet/security/iischk.asp"
      },
      {
        "trust": 0.3,
        "url": "http://www.microsoft.com/technet/treeview/default.asp?url=/technet/itsolutions/security/news/nt4srp.asp"
      },
      {
        "trust": 0.3,
        "url": "http://www.microsoft.com/technet/treeview/default.asp?url=/technet/prodtechnol/iis/tips/iis5chk.asp"
      },
      {
        "trust": 0.3,
        "url": "http://www.microsoft.com/technet/itsolutions/security/tools/redfix.asp"
      },
      {
        "trust": 0.3,
        "url": "http://www.cisco.com/warp/public/63/nbar_acl_codered.shtml"
      },
      {
        "trust": 0.3,
        "url": "http://xforce.iss.net/alerts/advise89.php"
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#544555"
      },
      {
        "db": "CERT/CC",
        "id": "VU#952336"
      },
      {
        "db": "BID",
        "id": "2880"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2001-000097"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200107-163"
      },
      {
        "db": "NVD",
        "id": "CVE-2001-0500"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CERT/CC",
        "id": "VU#544555"
      },
      {
        "db": "CERT/CC",
        "id": "VU#952336"
      },
      {
        "db": "BID",
        "id": "2880"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2001-000097"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200107-163"
      },
      {
        "db": "NVD",
        "id": "CVE-2001-0500"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2001-08-14T00:00:00",
        "db": "CERT/CC",
        "id": "VU#544555"
      },
      {
        "date": "2001-06-19T00:00:00",
        "db": "CERT/CC",
        "id": "VU#952336"
      },
      {
        "date": "2001-06-18T00:00:00",
        "db": "BID",
        "id": "2880"
      },
      {
        "date": "2007-04-01T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2001-000097"
      },
      {
        "date": "2001-06-18T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200107-163"
      },
      {
        "date": "2001-07-21T04:00:00",
        "db": "NVD",
        "id": "CVE-2001-0500"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2001-08-14T00:00:00",
        "db": "CERT/CC",
        "id": "VU#544555"
      },
      {
        "date": "2001-08-16T00:00:00",
        "db": "CERT/CC",
        "id": "VU#952336"
      },
      {
        "date": "2009-11-26T21:05:00",
        "db": "BID",
        "id": "2880"
      },
      {
        "date": "2007-04-01T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2001-000097"
      },
      {
        "date": "2005-05-02T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200107-163"
      },
      {
        "date": "2025-04-03T01:03:51.193000",
        "db": "NVD",
        "id": "CVE-2001-0500"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200107-163"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Microsoft Internet Information Server 4.0 (IIS) vulnerable to DoS when URL redirecting is enabled",
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#544555"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Boundary Condition Error",
    "sources": [
      {
        "db": "BID",
        "id": "2880"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200107-163"
      }
    ],
    "trust": 0.9
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…