← Zuruck zu CVEs
CVE-2017-7269
CRITICALCISA KEV9.8
Beschreibung
Buffer overflow in the ScStoragePathFromUrl function in the WebDAV service in Internet Information Services (IIS) 6.0 in Microsoft Windows Server 2003 R2 allows remote attackers to execute arbitrary code via a long header beginning with "If: <http://" in a PROPFIND request, as exploited in the wild in July or August 2016.
CVE Details
CVSS v3.1 Bewertung9.8
SchweregradCRITICAL
CVSS VektorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AngriffsvektorNETWORK
KomplexitatLOW
Erforderliche PrivilegienNONE
BenutzerinteraktionNONE
Veroffentlicht3/27/2017
Zuletzt geandert4/21/2026
Quellekev
Honeypot-Sichtungen0
CISA KEV
HerstellerMicrosoft
ProduktInternet Information Services (IIS)
SchwachstellennameMicrosoft Windows Server Buffer Overflow Vulnerability
KEV Aufnahmedatum2021-11-03
Behebungsfrist2022-05-03
Ransomware-NutzungUnknown
Betroffene Produkte
microsoft:internet_information_servicesmicrosoft:windows_server_2003
Schwachen (CWE)
CWE-120CWE-120
Referenzen
http://www.securityfocus.com/bid/97127(cve@mitre.org)
http://www.securitytracker.com/id/1038168(cve@mitre.org)
https://github.com/danigargu/explodingcan(cve@mitre.org)
https://github.com/edwardz246003/IIS_exploit(cve@mitre.org)
https://github.com/rapid7/metasploit-framework/pull/8162(cve@mitre.org)
https://medium.com/%40iraklis/number-of-internet-facing-vulnerable-iis-6-0-to-cve-2017-7269-8bd153ef5812(cve@mitre.org)
https://support.microsoft.com/en-us/help/3197835/description-of-the-security-update-for-windows-xp-and-windows-server(cve@mitre.org)
https://www.exploit-db.com/exploits/41738/(cve@mitre.org)
https://www.exploit-db.com/exploits/41992/(cve@mitre.org)
http://www.securityfocus.com/bid/97127(af854a3a-2127-422b-91ae-364da2661108)
http://www.securitytracker.com/id/1038168(af854a3a-2127-422b-91ae-364da2661108)
https://0patch.blogspot.com/2017/03/0patching-immortal-cve-2017-7269.html(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/danigargu/explodingcan(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/edwardz246003/IIS_exploit(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/rapid7/metasploit-framework/pull/8162(af854a3a-2127-422b-91ae-364da2661108)
https://medium.com/%40iraklis/number-of-internet-facing-vulnerable-iis-6-0-to-cve-2017-7269-8bd153ef5812(af854a3a-2127-422b-91ae-364da2661108)
https://support.microsoft.com/en-us/help/3197835/description-of-the-security-update-for-windows-xp-and-windows-server(af854a3a-2127-422b-91ae-364da2661108)
https://www.exploit-db.com/exploits/41738/(af854a3a-2127-422b-91ae-364da2661108)
https://www.exploit-db.com/exploits/41992/(af854a3a-2127-422b-91ae-364da2661108)
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2017-7269(134c704f-9b21-4f2e-91b3-4a467353bcc0)
IOC Korrelationen
Keine Korrelationen erfasst
This product uses data from the NVD API but is not endorsed or certified by the NVD.