Buffer overflow in the ScStoragePathFromUrl function in the WebDAV service in Internet Information Services (IIS) 6.0 in Microsoft Windows Server 2003 R2 allows remote attackers to execute arbitrary code via a long header beginning with "If: <http://" in a PROPFIND request, as exploited in the wild in July or August 2016.
The product copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer, leading to a buffer overflow.
Link | Tags |
---|---|
https://www.exploit-db.com/exploits/41992/ | third party advisory exploit vdb entry |
http://www.securityfocus.com/bid/97127 | third party advisory broken link vdb entry |
https://medium.com/%40iraklis/number-of-internet-facing-vulnerable-iis-6-0-to-cve-2017-7269-8bd153ef5812 | exploit |
https://github.com/rapid7/metasploit-framework/pull/8162 | patch issue tracking |
https://github.com/danigargu/explodingcan | exploit |
http://www.securitytracker.com/id/1038168 | third party advisory broken link vdb entry |
https://www.exploit-db.com/exploits/41738/ | third party advisory exploit vdb entry |
https://support.microsoft.com/en-us/help/3197835/description-of-the-security-update-for-windows-xp-and-windows-server | patch broken link vendor advisory |
https://0patch.blogspot.com/2017/03/0patching-immortal-cve-2017-7269.html | exploit third party advisory |
https://github.com/edwardz246003/IIS_exploit | third party advisory broken link |