ID

VAR-200802-0021


CVE

CVE-2008-0075


TITLE

Microsoft IIS of ASP Vulnerability in arbitrary code execution related to page input

Trust: 0.8

sources: JVNDB: JVNDB-2008-001106

DESCRIPTION

Unspecified vulnerability in Microsoft Internet Information Services (IIS) 5.1 through 6.0 allows remote attackers to execute arbitrary code via crafted inputs to ASP pages. ---------------------------------------------------------------------- A new version (0.9.0.0 - Release Candidate 1) of the free Secunia PSI has been released. The new version includes many new and advanced features, which makes it even easier to stay patched. SOLUTION: Apply patches. Windows XP Professional SP2: http://www.microsoft.com/downloads/details.aspx?FamilyID=2b498065-d682-4227-b23e-d234d7d6a3fe Windows XP Professional x64 Edition (optionally with SP2): http://www.microsoft.com/downloads/details.aspx?FamilyID=df9875f7-04d6-486e-bdb5-35e9e305fa1d Windows Server 2003 SP1 / SP2: http://www.microsoft.com/downloads/details.aspx?FamilyID=6583e798-d16d-419c-aee1-30c3e6c635b3 Windows Server 2003 x64 Edition (optionally with SP2): http://www.microsoft.com/downloads/details.aspx?familyid=e8286174-8209-409f-8805-e534715a741c Windows Server 2003 with SP1/SP2 for Itanium-based systems: http://www.microsoft.com/downloads/details.aspx?familyid=29faa70d-f1ac-4da4-b72a-faf1973cd845 PROVIDED AND/OR DISCOVERED BY: Reported by the vendor. ORIGINAL ADVISORY: MS08-006 (KB942830): http://www.microsoft.com/technet/security/Bulletin/MS08-006.mspx ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ---------------------------------------------------------------------- . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 National Cyber Alert System Technical Cyber Security Alert TA08-043C Microsoft Updates for Multiple Vulnerabilities Original release date: February 12, 2008 Last revised: February 12, 2008 Source: US-CERT Systems Affected * Microsoft Windows * Microsoft Internet Explorer * Microsoft Office * Microsoft Visual Basic * Microsoft Internet Information Services (IIS) Overview Microsoft has released updates that address critical vulnerabilities in Microsoft Windows, Internet Explorer, Office, Visual Basic and Internet Information Services (IIS). I. Description Microsoft has released updates to address vulnerabilities that affect Microsoft Windows, Internet Explorer, Office, Visual Basic and Internet Information Services (IIS) as part of the Microsoft Security Bulletin Summary for February 2008. For more information, see the US-CERT Vulnerability Notes Database. II. III. Solution Apply updates from Microsoft Microsoft has provided updates for these vulnerabilities in the February 2008 security bulletins. The security bulletins describe any known issues related to the updates. Administrators are encouraged to note these issues and test for any potentially adverse effects. Administrators should consider using an automated update distribution system such as Windows Server Update Services (WSUS). IV. References * US-CERT Vulnerability Notes for Microsoft February 2008 updates - <http://www.kb.cert.org/vuls/byid?searchview&query=ms08-feb> * Microsoft Security Bulletin Summary for February 2008 - <http://www.microsoft.com/technet/security/bulletin/ms08-feb.mspx> * Microsoft Update - <https://www.update.microsoft.com/microsoftupdate/> * Windows Server Update Services - <http://www.microsoft.com/windowsserversystem/updateservices/default.mspx> _________________________________________________________________ The most recent version of this document can be found at: <http://www.us-cert.gov/cas/techalerts/TA08-043C.html> _________________________________________________________________ Feedback can be directed to US-CERT Technical Staff. Please send email to <cert@cert.org> with "TA08-043C Feedback VU#104665" in the subject. _________________________________________________________________ For instructions on subscribing to or unsubscribing from this mailing list, visit <http://www.us-cert.gov/cas/signup.html>. _________________________________________________________________ Produced 2008 by US-CERT, a government organization. Terms of use: <http://www.us-cert.gov/legal.html> _________________________________________________________________ Revision History February 12, 2008: Initial release -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.1 (GNU/Linux) iQEVAwUBR7IkKvRFkHkM87XOAQIMdgf/Z4QINqEeDeTdbKj9Jn4K+v5WKr+GWL0R J3C7PfJyQvqnl0ctnqF4DOBvi8xgPXWuhCqh6XEgi7ImkJVxI8HPpy1gj8K9YC5J ZDidLPOPvo3suzeEw3pNX/9oN9sOSsvCxwkzgq3cw7e3/vh69zLJWEg3Mz5Vc0UC lU8u4HLMpDFXzn2NA3/YlTDyc45OV3Z5LCA8GHkqIBzZLZUtprIjIeXBOxbY3pqw Ac9f8FB5c88PHW8+34pXmzt7QXuynW+8yrCuApIc0ZduUpB1+7Pi1aVmDwxxGdSz GUP3Ue8minBwUIyBn3h1jxUwO7nADPToVVLHj8fwHaFXvoNQha8iKg== =imPA -----END PGP SIGNATURE-----

Trust: 2.07

sources: NVD: CVE-2008-0075 // JVNDB: JVNDB-2008-001106 // BID: 27676 // PACKETSTORM: 63544 // PACKETSTORM: 63559

AFFECTED PRODUCTS

vendor:microsoftmodel:internet information serverscope:eqversion:6.0

Trust: 1.6

vendor:microsoftmodel:iisscope:eqversion:6.0

Trust: 1.1

vendor:microsoftmodel:iisscope:eqversion:5.1

Trust: 1.1

vendor:microsoftmodel:windows server 2003scope:eqversion:none

Trust: 0.8

vendor:microsoftmodel:windows server 2003scope:eqversion:(itanium)

Trust: 0.8

vendor:microsoftmodel:windows server 2003scope:eqversion:(x64)

Trust: 0.8

vendor:microsoftmodel:windows xpscope:eqversion:(x64)

Trust: 0.8

vendor:microsoftmodel:windows xpscope:eqversion:sp3

Trust: 0.8

vendor:microsoftmodel:internet information serverscope:eqversion:5.1

Trust: 0.6

sources: BID: 27676 // JVNDB: JVNDB-2008-001106 // CNNVD: CNNVD-200802-228 // NVD: CVE-2008-0075

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2008-0075
value: HIGH

Trust: 1.0

NVD: CVE-2008-0075
value: HIGH

Trust: 0.8

CNNVD: CNNVD-200802-228
value: CRITICAL

Trust: 0.6

nvd@nist.gov: CVE-2008-0075
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

sources: JVNDB: JVNDB-2008-001106 // CNNVD: CNNVD-200802-228 // NVD: CVE-2008-0075

PROBLEMTYPE DATA

problemtype:CWE-94

Trust: 1.8

problemtype:NVD-CWE-noinfo

Trust: 1.0

problemtype:CWE-noinfo

Trust: 0.8

sources: JVNDB: JVNDB-2008-001106 // NVD: CVE-2008-0075

THREAT TYPE

remote

Trust: 0.7

sources: PACKETSTORM: 63559 // CNNVD: CNNVD-200802-228

TYPE

code injection

Trust: 0.6

sources: CNNVD: CNNVD-200802-228

CONFIGURATIONS

sources: JVNDB: JVNDB-2008-001106

PATCH

title:MS08-006url:http://www.microsoft.com/technet/security/bulletin/ms08-006.mspx

Trust: 0.8

title:MS08-006url:http://www.microsoft.com/japan/technet/security/bulletin/ms08-006.mspx

Trust: 0.8

title:MS08-006eurl:http://www.microsoft.com/japan/security/bulletins/MS08-006e.mspx

Trust: 0.8

title:TA08-043Curl:http://software.fujitsu.com/jp/security/vulnerabilities/ta08-043c.html

Trust: 0.8

sources: JVNDB: JVNDB-2008-001106

EXTERNAL IDS

db:NVDid:CVE-2008-0075

Trust: 2.7

db:BIDid:27676

Trust: 2.7

db:USCERTid:TA08-043C

Trust: 2.5

db:SECUNIAid:28893

Trust: 2.5

db:SECTRACKid:1019385

Trust: 2.4

db:VUPENid:ADV-2008-0508

Trust: 1.6

db:USCERTid:SA08-043C

Trust: 0.8

db:JVNDBid:JVNDB-2008-001106

Trust: 0.8

db:CNNVDid:CNNVD-200802-228

Trust: 0.6

db:PACKETSTORMid:63544

Trust: 0.1

db:PACKETSTORMid:63559

Trust: 0.1

sources: BID: 27676 // JVNDB: JVNDB-2008-001106 // PACKETSTORM: 63544 // PACKETSTORM: 63559 // CNNVD: CNNVD-200802-228 // NVD: CVE-2008-0075

REFERENCES

url:http://secunia.com/advisories/28893

Trust: 2.4

url:http://www.securityfocus.com/bid/27676

Trust: 2.4

url:http://www.securitytracker.com/id?1019385

Trust: 2.4

url:http://www.us-cert.gov/cas/techalerts/ta08-043c.html

Trust: 2.4

url:https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-006

Trust: 1.6

url:https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a5308

Trust: 1.6

url:http://marc.info/?l=bugtraq&m=120361015026386&w=2

Trust: 1.6

url:http://www.vupen.com/english/advisories/2008/0508/references

Trust: 1.6

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-0075

Trust: 0.8

url:http://www.frsirt.com/english/advisories/2008/0508

Trust: 0.8

url:http://www.jpcert.or.jp/at/2008/at080003.txt

Trust: 0.8

url:http://jvn.jp/cert/jvnta08-043c/index.html

Trust: 0.8

url:http://jvn.jp/tr/trta08-043c/index.html

Trust: 0.8

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-0075

Trust: 0.8

url:http://www.us-cert.gov/cas/alerts/sa08-043c.html

Trust: 0.8

url:http://www.cyberpolice.go.jp/important/2008/20080214_212436.html

Trust: 0.8

url:http://www.microsoft.com/technet/security/bulletin/ms08-006.mspx

Trust: 0.4

url:https://strikecenter.bpointsys.com/articles/2008/02/13/exploiting-iis-via-htmlencode-ms08-006

Trust: 0.3

url:http://www.microsoft.com/downloads/details.aspx?familyid=df9875f7-04d6-486e-bdb5-35e9e305fa1d

Trust: 0.1

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

url:https://psi.secunia.com/?page=changelog

Trust: 0.1

url:https://psi.secunia.com/

Trust: 0.1

url:http://www.microsoft.com/downloads/details.aspx?familyid=2b498065-d682-4227-b23e-d234d7d6a3fe

Trust: 0.1

url:http://secunia.com/product/39/

Trust: 0.1

url:http://www.microsoft.com/downloads/details.aspx?familyid=29faa70d-f1ac-4da4-b72a-faf1973cd845

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://www.microsoft.com/downloads/details.aspx?familyid=e8286174-8209-409f-8805-e534715a741c

Trust: 0.1

url:http://secunia.com/advisories/28893/

Trust: 0.1

url:http://secunia.com/product/1438/

Trust: 0.1

url:http://www.microsoft.com/downloads/details.aspx?familyid=6583e798-d16d-419c-aee1-30c3e6c635b3

Trust: 0.1

url:http://www.us-cert.gov/cas/techalerts/ta08-043c.html>

Trust: 0.1

url:http://www.kb.cert.org/vuls/byid?searchview&query=ms08-feb>

Trust: 0.1

url:http://www.microsoft.com/technet/security/bulletin/ms08-feb.mspx>

Trust: 0.1

url:http://www.microsoft.com/windowsserversystem/updateservices/default.mspx>

Trust: 0.1

url:http://www.us-cert.gov/cas/signup.html>.

Trust: 0.1

url:http://www.us-cert.gov/legal.html>

Trust: 0.1

url:https://www.update.microsoft.com/microsoftupdate/>

Trust: 0.1

sources: BID: 27676 // JVNDB: JVNDB-2008-001106 // PACKETSTORM: 63544 // PACKETSTORM: 63559 // CNNVD: CNNVD-200802-228 // NVD: CVE-2008-0075

CREDITS

Microsoft

Trust: 0.6

sources: CNNVD: CNNVD-200802-228

SOURCES

db:BIDid:27676
db:JVNDBid:JVNDB-2008-001106
db:PACKETSTORMid:63544
db:PACKETSTORMid:63559
db:CNNVDid:CNNVD-200802-228
db:NVDid:CVE-2008-0075

LAST UPDATE DATE

2025-04-10T19:48:43.693000+00:00


SOURCES UPDATE DATE

db:BIDid:27676date:2008-02-15T23:45:00
db:JVNDBid:JVNDB-2008-001106date:2008-02-28T00:00:00
db:CNNVDid:CNNVD-200802-228date:2020-11-25T00:00:00
db:NVDid:CVE-2008-0075date:2025-04-09T00:30:58.490

SOURCES RELEASE DATE

db:BIDid:27676date:2008-02-12T00:00:00
db:JVNDBid:JVNDB-2008-001106date:2008-02-28T00:00:00
db:PACKETSTORMid:63544date:2008-02-12T22:33:42
db:PACKETSTORMid:63559date:2008-02-12T23:07:55
db:CNNVDid:CNNVD-200802-228date:2008-02-12T00:00:00
db:NVDid:CVE-2008-0075date:2008-02-12T21:00:00