HTTP: Microsoft IIS .DLL URL Remote Code Execution

This signature detects attempts to exploit a known vulnerability in Microsoft Internet Information Service (IIS). Attackers can send malformed URL requests that can trigger a denial-of-service condition or in worst cases would allow an attacker to execute remote code on the target system.

Extended Description

The URL parser in Microsoft Internet Information Services (IIS) 5.1 on Windows XP Professional SP2 allows remote attackers to execute arbitrary code via multiple requests to ".dll" followed by arguments such as "~0" through "~9", which causes ntdll.dll to produce a return value that is not correctly handled by IIS, as demonstrated using "/_vti_bin/.dll/*/~0". NOTE: the consequence was originally believed to be only a denial of service (application crash and reboot).

Short Name
HTTP:IIS:DLL-URL-REQ
Severity
Major
Recommended
False
Recommended Action
Drop
Category
HTTP
Keywords
.DLL CVE-2005-4360 Code Execution IIS Microsoft Remote URL bid:15921
Release Date
12/21/2005
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3727
False Positive
Unknown
CVSS Score

7.8

Found a potential security threat?