Buffer overflow in the ScStoragePathFromUrl function in the WebDAV service in Internet Information Services (IIS) 6.0 in Microsoft Windows Server 2003 R2 allows remote attackers to execute arbitrary code via a long header beginning with "If: <http://" in a PROPFIND request, as exploited in the wild in July or August 2016.
The product copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer, leading to a buffer overflow.
Link | Tags |
---|---|
https://www.exploit-db.com/exploits/41992/ | exploit vdb entry third party advisory |
http://www.securityfocus.com/bid/97127 | vdb entry third party advisory broken link |
https://medium.com/%40iraklis/number-of-internet-facing-vulnerable-iis-6-0-to-cve-2017-7269-8bd153ef5812 | exploit |
https://github.com/rapid7/metasploit-framework/pull/8162 | issue tracking patch |
https://github.com/danigargu/explodingcan | exploit |
http://www.securitytracker.com/id/1038168 | vdb entry third party advisory broken link |
https://www.exploit-db.com/exploits/41738/ | exploit vdb entry third party advisory |
https://support.microsoft.com/en-us/help/3197835/description-of-the-security-update-for-windows-xp-and-windows-server | patch vendor advisory broken link |
https://0patch.blogspot.com/2017/03/0patching-immortal-cve-2017-7269.html | third party advisory exploit |
https://github.com/edwardz246003/IIS_exploit | third party advisory broken link |