Lucene search

K
nessusThis script is Copyright (C) 2000-2018 Tenable Network Security, Inc.FRONTPAGE_DVWSSR.NASL
HistoryApr 14, 2000 - 12:00 a.m.

Microsoft FrontPage dvwssr.dll Multiple Vulnerabilities

2000-04-1400:00:00
This script is Copyright (C) 2000-2018 Tenable Network Security, Inc.
www.tenable.com
141

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

EPSS

0.015

Percentile

87.1%

The version of Microsoft FrontPage running on the remote host has the following vulnerabilities in ‘/_vti_bin/_vti_aut/dvwssr.dll’ :

  • A security bypass vulnerability that allows anyone with web authoring permissions to alter other users’ files.

  • A remote buffer overflow vulnerability that could allow a remote attacker to crash the server, or possibly execute arbitrary code.

#
# (C) Tenable Network Security, Inc.
#

include("compat.inc");


if(description)
{
 script_id(10369);
 script_version ("1.59");
 script_cve_id("CVE-2000-0260");
 script_bugtraq_id(1109);
 script_xref(name:"MSFT", value:"MS00-025");

 script_name(english:"Microsoft FrontPage dvwssr.dll Multiple Vulnerabilities");
 script_summary(english:"Checks for the presence of  /_vti_bin/_vti_aut/dvwssr.dll");
 
 script_set_attribute(
   attribute:"synopsis",
   value:"The remote web server has multiple vulnerabilities."
 );
 script_set_attribute( attribute:"description",  value:
"The version of Microsoft FrontPage running on the remote host has
the following vulnerabilities in '/_vti_bin/_vti_aut/dvwssr.dll' :

  - A security bypass vulnerability that allows anyone with
    web authoring permissions to alter other users' files.

  - A remote buffer overflow vulnerability that could allow
    a remote attacker to crash the server, or possibly
    execute arbitrary code." );
 # https://web.archive.org/web/20031207215454/www.wiretrip.net/rfp/txt/rfp2k02.txt
 script_set_attribute(
   attribute:"see_also",
   value:"http://www.nessus.org/u?3772b65c"
 );
 script_set_attribute(
   attribute:"see_also",
   value:"https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2000/ms00-025"
 );
 script_set_attribute(attribute:"solution", value:
"Delete all copies of dvwssr.dll from the server.  Refer to the
Microsoft Security Bulletin for further information." );
 script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
 script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
 script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
 script_set_attribute(attribute:"exploit_available", value:"true");
 script_set_attribute(attribute:"plugin_publication_date", value: "2000/04/14");
 script_set_attribute(attribute:"vuln_publication_date", value: "2000/04/14");
 script_cvs_date("Date: 2018/11/15 20:50:25");

 script_set_attribute(attribute:"plugin_type", value:"remote");
 script_end_attributes();

 script_category(ACT_GATHER_INFO);
 script_family(english:"Web Servers");

 script_copyright(english:"This script is Copyright (C) 2000-2018 Tenable Network Security, Inc.");
 script_dependencie("find_service1.nasl", "http_version.nasl", "www_fingerprinting_hmap.nasl");
 script_require_ports("Services/www", 80);

 exit(0);
}

#
# The script code starts here
#

include("global_settings.inc");
include("misc_func.inc");
include("http.inc");

port = get_http_port(default:80);

banner = get_http_banner(port:port);
if ( ! banner ) exit(0);
if ( ! egrep(pattern:"^Server: .*IIS/[34]", string:banner ) ) exit(0);

w = http_send_recv3(method:"GET", item:"/", port:port);
if (ereg(pattern:"^HTTP/1\.. 40[14] ", string:w[0]))exit(0);

if (!ereg(pattern:"^HTTP/1\.. ", string:w[0]))exit(0);
  
w = http_send_recv3(method:"GET", item:"/_vti_bin/_vti_aut/dvwssr.dll", port:port);
code = w[0];
r = strcat(w[1], '\r\n', w[2]);

  #
  # IIS will return a 500 error for an unknown file,
  # and a 401 error when the file is present.
  #
  # According to https://web.archive.org/web/20000510063805/http://archives.neohapsis.com/archives/win2ksecadvice/2000-q2/0015.html
  # Example 3: 
  # $ nc -v -w2 target.system 80 
  # GET /_vti_bin/_vti_aut/dvwssr.dll HTTP/1.0 (hit enter twice) 
  # Connection closed by foreign host. 
  #
  # The connection closed means that you had the rights to run the DLL, but 
  # since no parameters were passed the connection was completed. 
  
  if("WWW-Authenticate:" >< r)exit(0);
  
  is200 = ereg(pattern:"^HTTP/[0-9]\.[0-9] 200 ", string:code);

  if(("HTTP/1.1 401 Access Denied" >< code) ||
      (strlen(r) == 0)  || is200 )  
  {
  if ( is200  && strlen(r))
   {
    no404 = tolower(get_kb_item(string("www/no404/",  port)));
    if(no404)
    {
     if(no404 >< tolower(r))exit(0);
    }
   }
   security_hole(port);
  }


CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

EPSS

0.015

Percentile

87.1%

Related for FRONTPAGE_DVWSSR.NASL