← Volver a CVEs
CVE-2017-7269
CRITICALCISA KEV9.8
Descripcion
Buffer overflow in the ScStoragePathFromUrl function in the WebDAV service in Internet Information Services (IIS) 6.0 in Microsoft Windows Server 2003 R2 allows remote attackers to execute arbitrary code via a long header beginning with "If: <http://" in a PROPFIND request, as exploited in the wild in July or August 2016.
Detalles CVE
Puntuacion CVSS v3.19.8
SeveridadCRITICAL
Vector CVSSCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Vector de ataqueNETWORK
ComplejidadLOW
Privilegios requeridosNONE
Interaccion usuarioNONE
Publicado3/27/2017
Ultima modificacion4/21/2026
Fuentekev
Avistamientos honeypot0
CISA KEV
VendedorMicrosoft
ProductoInternet Information Services (IIS)
Nombre vulnerabilidadMicrosoft Windows Server Buffer Overflow Vulnerability
Fecha inclusion KEV2021-11-03
Fecha limite remediacion2022-05-03
Uso en ransomwareUnknown
Productos afectados
microsoft:internet_information_servicesmicrosoft:windows_server_2003
Debilidades (CWE)
CWE-120CWE-120
Referencias
http://www.securityfocus.com/bid/97127(cve@mitre.org)
http://www.securitytracker.com/id/1038168(cve@mitre.org)
https://github.com/danigargu/explodingcan(cve@mitre.org)
https://github.com/edwardz246003/IIS_exploit(cve@mitre.org)
https://github.com/rapid7/metasploit-framework/pull/8162(cve@mitre.org)
https://medium.com/%40iraklis/number-of-internet-facing-vulnerable-iis-6-0-to-cve-2017-7269-8bd153ef5812(cve@mitre.org)
https://support.microsoft.com/en-us/help/3197835/description-of-the-security-update-for-windows-xp-and-windows-server(cve@mitre.org)
https://www.exploit-db.com/exploits/41738/(cve@mitre.org)
https://www.exploit-db.com/exploits/41992/(cve@mitre.org)
http://www.securityfocus.com/bid/97127(af854a3a-2127-422b-91ae-364da2661108)
http://www.securitytracker.com/id/1038168(af854a3a-2127-422b-91ae-364da2661108)
https://0patch.blogspot.com/2017/03/0patching-immortal-cve-2017-7269.html(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/danigargu/explodingcan(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/edwardz246003/IIS_exploit(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/rapid7/metasploit-framework/pull/8162(af854a3a-2127-422b-91ae-364da2661108)
https://medium.com/%40iraklis/number-of-internet-facing-vulnerable-iis-6-0-to-cve-2017-7269-8bd153ef5812(af854a3a-2127-422b-91ae-364da2661108)
https://support.microsoft.com/en-us/help/3197835/description-of-the-security-update-for-windows-xp-and-windows-server(af854a3a-2127-422b-91ae-364da2661108)
https://www.exploit-db.com/exploits/41738/(af854a3a-2127-422b-91ae-364da2661108)
https://www.exploit-db.com/exploits/41992/(af854a3a-2127-422b-91ae-364da2661108)
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2017-7269(134c704f-9b21-4f2e-91b3-4a467353bcc0)
Correlaciones IOC
Sin correlaciones registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.