← Voltar para CVEs
CVE-2017-7269
CRITICALCISA KEV9.8
Descricao
Buffer overflow in the ScStoragePathFromUrl function in the WebDAV service in Internet Information Services (IIS) 6.0 in Microsoft Windows Server 2003 R2 allows remote attackers to execute arbitrary code via a long header beginning with "If: <http://" in a PROPFIND request, as exploited in the wild in July or August 2016.
Detalhes CVE
Pontuacao CVSS v3.19.8
SeveridadeCRITICAL
Vetor CVSSCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Vetor de ataqueNETWORK
ComplexidadeLOW
Privilegios necessariosNONE
Interacao do usuarioNONE
Publicado3/27/2017
Ultima modificacao4/21/2026
Fontekev
Avistamentos honeypot0
CISA KEV
FornecedorMicrosoft
ProdutoInternet Information Services (IIS)
Nome da vulnerabilidadeMicrosoft Windows Server Buffer Overflow Vulnerability
Data inclusao KEV2021-11-03
Prazo de remediacao2022-05-03
Uso em ransomwareUnknown
Produtos afetados
microsoft:internet_information_servicesmicrosoft:windows_server_2003
Fraquezas (CWE)
CWE-120CWE-120
Referencias
http://www.securityfocus.com/bid/97127(cve@mitre.org)
http://www.securitytracker.com/id/1038168(cve@mitre.org)
https://github.com/danigargu/explodingcan(cve@mitre.org)
https://github.com/edwardz246003/IIS_exploit(cve@mitre.org)
https://github.com/rapid7/metasploit-framework/pull/8162(cve@mitre.org)
https://medium.com/%40iraklis/number-of-internet-facing-vulnerable-iis-6-0-to-cve-2017-7269-8bd153ef5812(cve@mitre.org)
https://support.microsoft.com/en-us/help/3197835/description-of-the-security-update-for-windows-xp-and-windows-server(cve@mitre.org)
https://www.exploit-db.com/exploits/41738/(cve@mitre.org)
https://www.exploit-db.com/exploits/41992/(cve@mitre.org)
http://www.securityfocus.com/bid/97127(af854a3a-2127-422b-91ae-364da2661108)
http://www.securitytracker.com/id/1038168(af854a3a-2127-422b-91ae-364da2661108)
https://0patch.blogspot.com/2017/03/0patching-immortal-cve-2017-7269.html(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/danigargu/explodingcan(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/edwardz246003/IIS_exploit(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/rapid7/metasploit-framework/pull/8162(af854a3a-2127-422b-91ae-364da2661108)
https://medium.com/%40iraklis/number-of-internet-facing-vulnerable-iis-6-0-to-cve-2017-7269-8bd153ef5812(af854a3a-2127-422b-91ae-364da2661108)
https://support.microsoft.com/en-us/help/3197835/description-of-the-security-update-for-windows-xp-and-windows-server(af854a3a-2127-422b-91ae-364da2661108)
https://www.exploit-db.com/exploits/41738/(af854a3a-2127-422b-91ae-364da2661108)
https://www.exploit-db.com/exploits/41992/(af854a3a-2127-422b-91ae-364da2661108)
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2017-7269(134c704f-9b21-4f2e-91b3-4a467353bcc0)
Correlacoes IOC
Sem correlacoes registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.